Vulnerabilites related to amd - epyc_7443_firmware
CVE-2021-26371 (GCVE-0-2021-26371)
Vulnerability from cvelistv5
Published
2023-05-09 18:59
Modified
2025-01-28 15:46
Summary
A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.
Impacted products
Vendor Product Version
AMD Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4 Version: various
Create a notification for this product.
   AMD 3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Chagall” WS Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock” Version: various
Create a notification for this product.
   AMD Ryzen™ 2000 Series Mobile Processors “Raven Ridge” FP5 Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso” Version: various
Create a notification for this product.
   AMD 1st Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.196Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26371",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:45:57.811621Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:46:02.389Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A compromised or malicious ABL or UApp could\nsend a SHA256 system call to the bootloader, which may result in exposure of\nASP memory to userspace, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "A compromised or malicious ABL or UApp could\nsend a SHA256 system call to the bootloader, which may result in exposure of\nASP memory to userspace, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:59:16.122Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4001, AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26371",
    "datePublished": "2023-05-09T18:59:16.122Z",
    "dateReserved": "2021-01-29T21:24:26.152Z",
    "dateUpdated": "2025-01-28T15:46:02.389Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20528 (GCVE-0-2023-20528)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:35
CWE
  • n/a
Summary
Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.973Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "NONE",
              "baseScore": 2.4,
              "baseSeverity": "LOW",
              "confidentialityImpact": "LOW",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20528",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:58:44.299784Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:35:25.086Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20528",
    "datePublished": "2023-01-10T20:57:03.392Z",
    "dateReserved": "2022-10-27T18:53:39.738Z",
    "dateUpdated": "2025-04-07T18:35:25.086Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20573 (GCVE-0-2023-20573)
Vulnerability from cvelistv5
Published
2024-01-11 13:53
Modified
2025-06-20 16:12
Summary
A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.236Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 3.2,
              "baseSeverity": "LOW",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "HIGH",
              "scope": "CHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20573",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-01-11T20:36:55.598699Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-06-20T16:12:15.413Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        }
      ],
      "datePublic": "2024-01-09T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n"
            }
          ],
          "value": "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-11T13:53:52.581Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3004",
        "discovery": "UNKNOWN"
      },
      "title": "Debug Exception Delivery in Secure Nested Paging",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20573",
    "datePublished": "2024-01-11T13:53:52.581Z",
    "dateReserved": "2022-10-27T18:53:39.755Z",
    "dateUpdated": "2025-06-20T16:12:15.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26353 (GCVE-0-2021-26353)
Vulnerability from cvelistv5
Published
2022-05-10 18:33
Modified
2024-08-03 20:26
Severity ?
CWE
  • n/a
Summary
Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.
Impacted products
Vendor Product Version
AMD 3rd Gen EPYC Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.535Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.\n\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843980Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26353",
    "datePublished": "2022-05-10T18:33:42.470384Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-08-03T20:26:24.535Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20578 (GCVE-0-2023-20578)
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2025-03-18 20:03
Summary
A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7001",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.k"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7002",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.g"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:epyc_9004:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_9004",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.2"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:epyc_embedded_3000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_embedded_3000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.1.0.a"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:epyc_embedded_7002:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_embedded_7002",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.a"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:epyc_embedded_7003:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_embedded_7003",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.7"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:epyc_embedded_9003:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_embedded_9003",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_7000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_7000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.0"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "ryzen_embedded_v3000",
            "vendor": "amd",
            "versions": [
              {
                "status": "unaffected",
                "version": "1.0.0.8"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20578",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-15T15:56:35.845479Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-367",
                "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-18T20:03:43.905Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "PI",
          "product": "AMD EPYC\u2122 7001 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "NaplesPI 1.0.0.K",
              "versionType": "PI"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7002 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RomePI 1.0.0.G"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7003 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "MilanPI 1.0.0.B"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 9004 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "GenoaPI 1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 7000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM5 1.0.0.1"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ChagallWSPI-sWRX8  1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "MendocinoPI-FT6 1.0.0.0"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RembrandtPI-FP7 1.0.0.9b"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RembrandtPI-FP7 1.0.0.9b"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "SnowyOwl  PI 1.1.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbRomePI-SP3 1.0.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbMilanPI-SP3 1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 9003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbGenoaPI-SP5  1.0.0.0"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded 7000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedAM5PI  1.0.0.0"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD RyzenTM Embedded V3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP7r2 1.0.0.8"
            }
          ]
        }
      ],
      "datePublic": "2024-08-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications \u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003ebuffer\u0026nbsp;\u003c/a\u003epotentially\nresulting in arbitrary code execution.\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e"
            }
          ],
          "value": "A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications buffer\u00a0potentially\nresulting in arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:52:58.457Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20578",
    "datePublished": "2024-08-13T16:52:58.457Z",
    "dateReserved": "2022-10-27T18:53:39.757Z",
    "dateUpdated": "2025-03-18T20:03:43.905Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26370 (GCVE-0-2021-26370)
Vulnerability from cvelistv5
Published
2022-05-10 18:25
Modified
2024-09-16 22:20
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
Impacted products
Vendor Product Version
AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.820Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-10T18:25:17",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-06T20:00:00.000Z",
          "ID": "CVE-2021-26370",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26370",
    "datePublished": "2022-05-10T18:25:17.618373Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T22:20:14.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26349 (GCVE-0-2021-26349)
Vulnerability from cvelistv5
Published
2022-05-11 16:24
Modified
2024-09-17 01:05
Severity ?
CWE
  • tbd
Summary
Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA).
Impacted products
Vendor Product Version
AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.008Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T16:24:22",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1028",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26349",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EPYC\u2122 Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA)."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1028",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26349",
    "datePublished": "2022-05-11T16:24:22.957466Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T01:05:40.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46778 (GCVE-0-2021-46778)
Vulnerability from cvelistv5
Published
2022-08-09 20:20
Modified
2024-09-17 00:36
Severity ?
CWE
  • NA
Summary
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
Impacted products
Vendor Product Version
AMD AMD Processors Version: Processor Some AMD Processors
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.676Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Processor  Some AMD Processors"
            }
          ]
        }
      ],
      "datePublic": "2022-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-09T20:20:12",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-08-09T16:00:00.000Z",
          "ID": "CVE-2021-46778",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "Processor",
                            "version_value": "Some AMD Processors"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039"
            }
          ]
        },
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46778",
    "datePublished": "2022-08-09T20:20:12.911867Z",
    "dateReserved": "2022-03-31T00:00:00",
    "dateUpdated": "2024-09-17T00:36:13.880Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46744 (GCVE-0-2021-46744)
Vulnerability from cvelistv5
Published
2022-05-11 16:40
Modified
2024-09-16 23:46
Severity ?
CWE
  • NA
Summary
An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.
Impacted products
Vendor Product Version
AMD AMD Processors Version: Processor EPYC
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.590Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033"
          },
          {
            "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Processor  EPYC"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-08T17:07:10",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033"
        },
        {
          "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:30:00.000Z",
          "ID": "CVE-2021-46744",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_name": "Processor",
                            "version_value": "EPYC"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033"
            },
            {
              "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
            }
          ]
        },
        "source": {
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46744",
    "datePublished": "2022-05-11T16:40:21.925600Z",
    "dateReserved": "2022-03-31T00:00:00",
    "dateUpdated": "2024-09-16T23:46:24.093Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20529 (GCVE-0-2023-20529)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:34
CWE
  • n/a
Summary
Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.240Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20529",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:58:06.650420Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:34:54.131Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20529",
    "datePublished": "2023-01-10T20:57:04.799Z",
    "dateReserved": "2022-10-27T18:53:39.738Z",
    "dateUpdated": "2025-04-07T18:34:54.131Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12954 (GCVE-0-2020-12954)
Vulnerability from cvelistv5
Published
2021-11-16 18:11
Modified
2024-09-16 18:48
Severity ?
CWE
  • CWE-693 - Protection Mechanism Failure
Summary
A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.
Impacted products
Vendor Product Version
AMD 1st Gen AMD EPYC™ Version: unspecified   < NaplesPI-SP3_1.0.0.G
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.706Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "NaplesPI-SP3_1.0.0.G",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-693",
              "description": "CWE-693 Protection Mechanism Failure",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:11:02",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12954",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "NaplesPI-SP3_1.0.0.G"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-693 Protection Mechanism Failure"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12954",
    "datePublished": "2021-11-16T18:11:02.785753Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T18:48:26.077Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26344 (GCVE-0-2021-26344)
Vulnerability from cvelistv5
Published
2024-08-13 16:49
Modified
2025-03-18 15:35
Summary
An out of bounds memory write when processing the AMD PSP1 Configuration Block (APCB) could allow an attacker with access the ability to modify the BIOS image, and the ability to sign the resulting image, to potentially modify the APCB block resulting in arbitrary code execution.
Impacted products
Vendor Product Version
AMD AMD EPYC™ 7001 Series Processors Version: various
Create a notification for this product.
   AMD AMD EPYC™ 7002 Series Processors Create a notification for this product.
   AMD AMD EPYC™ 7003 Series Processors Create a notification for this product.
   AMD AMD Ryzen™ 3000 Series Desktop Processors Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Desktop Processors Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics Create a notification for this product.
   AMD AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Threadripper™ 3000 Series Processors Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Threadripper™ PRO 5000WX Processors Create a notification for this product.
   AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics Create a notification for this product.
   AMD AMD EPYC™ Embedded 7002 Series Processors Create a notification for this product.
   AMD AMD EPYC™ Embedded 3000 Series Processors Version: Various
Create a notification for this product.
   AMD AMD EPYC™ Embedded 7003 Series Processors Create a notification for this product.
   AMD AMD Ryzen™ Embedded R1000 Series Processors Version: v
Create a notification for this product.
   AMD AMD Ryzen™ Embedded R2000 Series Processors Version: v
Create a notification for this product.
   AMD AMD Ryzen™ Embedded 5000 Series Processors Version: v
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V1000 Series Processors Version: v
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V2000 Series Processors Version: v
Create a notification for this product.
   AMD AMD Ryzen™ Embedded V3000 Series Processors Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:h:amd:naplespi:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "naplespi",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "1.0.0.k",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:romepi:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "romepi",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "1.0.0.C",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "milanpi",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "1.0.0.5",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-26344",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T18:29:11.333464Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-18T15:35:45.232Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7001 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various",
              "versionType": "PI"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7002 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RomePI 1.0.0.C"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7003 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "MilanPI 1.0.0.5"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4V2 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ComboAM4V2 1.2.0.A"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "ChagallWSPI-sWRX8  1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "MendocinoPI-FT6 1.0.0.3"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RembrandtPI-FP7 1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "RembrandtPI-FP7 1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "CezannePI-FP6 1.0.0.E"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7002 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbRomePI-SP3  1.0.0.6"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 3000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7003 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbMilanPI-SP3  1.0.0.2"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "v"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "v"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded 5000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "v"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "v"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "v"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V3000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedPI-FP7r2 1.0.0.4"
            }
          ]
        }
      ],
      "datePublic": "2024-08-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution.\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e"
            }
          ],
          "value": "An out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.2,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:49:52.889Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26344",
    "datePublished": "2024-08-13T16:49:52.889Z",
    "dateReserved": "2021-01-29T21:24:26.145Z",
    "dateUpdated": "2025-03-18T15:35:45.232Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20524 (GCVE-0-2023-20524)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:51
Summary
An attacker with a compromised ASP could possibly send malformed commands to an ASP on another CPU, resulting in an out of bounds write, potentially leading to a loss a loss of integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:45.864Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20524",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:51:30.500815Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:51:34.268Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "An attacker with a compromised ASP could\npossibly send malformed commands to an ASP on another CPU, resulting in an out\nof bounds write, potentially leading to a loss a loss of integrity.\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "An attacker with a compromised ASP could\npossibly send malformed commands to an ASP on another CPU, resulting in an out\nof bounds write, potentially leading to a loss a loss of integrity.\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:54:00.877Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20524",
    "datePublished": "2023-05-09T18:36:29.876Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2025-01-28T15:51:34.268Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20520 (GCVE-0-2023-20520)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:54
Severity ?
Summary
Improper access control settings in ASP Bootloader may allow an attacker to corrupt the return address causing a stack-based buffer overrun potentially leading to arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.261Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20520",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:54:12.407663Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:54:22.503Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper access control settings in ASP\nBootloader may allow an attacker to corrupt the return address causing a\nstack-based buffer overrun potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Improper access control settings in ASP\nBootloader may allow an attacker to corrupt the return address causing a\nstack-based buffer overrun potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:53:42.276Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20520",
    "datePublished": "2023-05-09T18:36:29.141Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2025-01-28T15:54:22.503Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12961 (GCVE-0-2020-12961)
Vulnerability from cvelistv5
Published
2021-11-16 18:13
Modified
2024-09-17 04:13
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.
Impacted products
Vendor Product Version
AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.051Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:13:39",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2020-12961",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12961",
    "datePublished": "2021-11-16T18:13:39.959506Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T04:13:59.255Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20523 (GCVE-0-2023-20523)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-07 15:47
CWE
  • n/a
Summary
TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.871Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.7,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20523",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:18:11.465497Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-367",
                "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T15:47:41.028Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.\u003cbr\u003e"
            }
          ],
          "value": "TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20523",
    "datePublished": "2023-01-10T20:56:59.383Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2025-04-07T15:47:41.028Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20530 (GCVE-0-2023-20530)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:34
CWE
  • n/a
Summary
Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.
Impacted products
Vendor Product Version
AMD 3rd Gen EPYC Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.921Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20530",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:57:23.417698Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:34:30.136Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20530",
    "datePublished": "2023-01-10T20:57:06.132Z",
    "dateReserved": "2022-10-27T18:53:39.739Z",
    "dateUpdated": "2025-04-07T18:34:30.136Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46771 (GCVE-0-2021-46771)
Vulnerability from cvelistv5
Published
2022-05-10 18:30
Modified
2024-09-17 04:09
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.514Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-10T18:30:03",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-06T20:00:00.000Z",
          "ID": "CVE-2021-46771",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46771",
    "datePublished": "2022-05-10T18:30:03.257543Z",
    "dateReserved": "2022-03-31T00:00:00",
    "dateUpdated": "2024-09-17T04:09:13.761Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26340 (GCVE-0-2021-26340)
Vulnerability from cvelistv5
Published
2021-12-10 21:55
Modified
2024-09-16 16:29
Severity ?
CWE
  • NA
Summary
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
Impacted products
Vendor Product Version
AMD AMD EPYC™ Version: Processor   <
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.922Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThanOrEqual": "3rd gen EPYC",
              "status": "affected",
              "version": "Processor",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-12-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-12-10T21:55:10",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1023",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-12-06T20:30:00.000Z",
          "ID": "CVE-2021-26340",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c=",
                            "version_name": "Processor",
                            "version_value": "3rd gen EPYC"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "NA"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1023",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26340",
    "datePublished": "2021-12-10T21:55:10.021622Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T16:29:03.775Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31347 (GCVE-0-2023-31347)
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2025-03-17 17:46
Summary
Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity.  
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:31.084Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 4.9,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "HIGH",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-31347",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-16T19:50:42.676211Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-682",
                "description": "CWE-682 Incorrect Calculation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-17T17:46:05.955Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122 Processors ",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2024-02-14T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \u0026nbsp;\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \u00a0\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T19:18:51.045Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3007",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-31347",
    "datePublished": "2024-02-13T19:18:51.045Z",
    "dateReserved": "2023-04-27T15:25:41.427Z",
    "dateUpdated": "2025-03-17T17:46:05.955Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26322 (GCVE-0-2021-26322)
Vulnerability from cvelistv5
Published
2021-11-16 17:58
Modified
2024-09-17 00:56
Severity ?
CWE
Summary
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.
Impacted products
Vendor Product Version
AMD 1st Gen AMD EPYC™ Version: unspecified   < NaplesPI-SP3_1.0.0.G
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.397Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "NaplesPI-SP3_1.0.0.G",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-320",
              "description": "CWE-320 Key Management Errors",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T17:58:40",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26322",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "NaplesPI-SP3_1.0.0.G"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-320 Key Management Errors"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26322",
    "datePublished": "2021-11-16T17:58:40.230958Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T00:56:29.964Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20521 (GCVE-0-2023-20521)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Summary
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
Impacted products
Vendor Product Version
AMD Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4 Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20521",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-11-27T19:38:18.334372Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-07-26T14:56:31.535Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.873Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics \u201cPicasso\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics \u201cPicasso\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded R2000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122 Embedded V1000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:42:56.250Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20521",
    "datePublished": "2023-11-14T18:52:31.662Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2024-08-02T09:05:36.873Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26321 (GCVE-0-2021-26321)
Vulnerability from cvelistv5
Published
2021-11-16 18:07
Modified
2024-09-16 18:56
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.
Impacted products
Vendor Product Version
AMD 1st Gen AMD EPYC™ Version: unspecified   < NaplesPI-SP3_1.0.0.G
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.280Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "NaplesPI-SP3_1.0.0.G",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:07:26",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26321",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "NaplesPI-SP3_1.0.0.G"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26321",
    "datePublished": "2021-11-16T18:07:26.527350Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T18:56:13.855Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26323 (GCVE-0-2021-26323)
Vulnerability from cvelistv5
Published
2021-11-16 18:14
Modified
2024-09-16 23:45
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.475Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:14:43",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26323",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26323",
    "datePublished": "2021-11-16T18:14:43.401480Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T23:45:40.552Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26404 (GCVE-0-2021-26404)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-08 20:22
CWE
  • n/a
Summary
Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.
Impacted products
Vendor Product Version
AMD 3rd Gen EPYC Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.180Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26404",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-08T20:20:43.599778Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-08T20:22:33.575Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.\u003cbr\u003e"
            }
          ],
          "value": "Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26404",
    "datePublished": "2023-01-10T20:56:44.456Z",
    "dateReserved": "2021-01-29T21:24:26.170Z",
    "dateUpdated": "2025-04-08T20:22:33.575Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31346 (GCVE-0-2023-31346)
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2025-03-20 20:27
Summary
Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 6,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "HIGH",
              "scope": "CHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-31346",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-02-21T20:06:47.743045Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-284",
                "description": "CWE-284 Improper Access Control",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-20T20:27:50.012Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:53:30.943Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122 Processors ",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2024-02-13T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-02-13T19:18:21.462Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3007",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-31346",
    "datePublished": "2024-02-13T19:18:19.089Z",
    "dateReserved": "2023-04-27T15:25:41.427Z",
    "dateUpdated": "2025-03-20T20:27:50.012Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20566 (GCVE-0-2023-20566)
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-12-03 14:26
Summary
Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.943Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20566",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2023-11-27T20:58:09.078592Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-03T14:26:45.381Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 9003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:36:52.542Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3002",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20566",
    "datePublished": "2023-11-14T18:54:00.908Z",
    "dateReserved": "2022-10-27T18:53:39.753Z",
    "dateUpdated": "2024-12-03T14:26:45.381Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26347 (GCVE-0-2021-26347)
Vulnerability from cvelistv5
Published
2022-05-11 16:22
Modified
2024-08-03 20:26
Severity ?
CWE
  • n/a
Summary
Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.052Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen 5000 Series",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service."
            }
          ],
          "value": "Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843980Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1031",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26347",
    "datePublished": "2022-05-11T16:22:09.774768Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-08-03T20:26:25.052Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26328 (GCVE-0-2021-26328)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 15:11
CWE
  • n/a
Summary
Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.
Impacted products
Vendor Product Version
AMD 3rd Gen EPYC Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.263Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26328",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T15:11:51.526597Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-358",
                "description": "CWE-358 Improperly Implemented Security Check for Standard",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T15:11:57.590Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.\n\n\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26328",
    "datePublished": "2023-01-10T20:56:33.464Z",
    "dateReserved": "2021-01-29T21:24:26.141Z",
    "dateUpdated": "2025-04-09T15:11:57.590Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20584 (GCVE-0-2023-20584)
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2024-11-05 21:40
Summary
IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20584",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-13T17:31:27.946120Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-05T21:40:37.392Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7003 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "MilanPI 1.0.0.C",
              "versionType": "PI"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 9004 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "GenoaPI 1.0.0.B"
            }
          ]
        }
      ],
      "datePublic": "2024-08-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised \u003ca target=\"_blank\" rel=\"nofollow\"\u003eHypervisor \u003c/a\u003eto\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity.\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\n\n\u003cdiv\u003e\n\n\n\n\n\n\u003cdiv\u003e\n\n\u003cdiv\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\n\n\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e"
            }
          ],
          "value": "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:53:18.373Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20584",
    "datePublished": "2024-08-13T16:53:18.373Z",
    "dateReserved": "2022-10-27T18:53:39.759Z",
    "dateUpdated": "2024-11-05T21:40:37.392Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46764 (GCVE-0-2021-46764)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:59
Summary
Improper validation of DRAM addresses in SMU may allow an attacker to overwrite sensitive memory locations within the ASP potentially resulting in a denial of service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.271Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-46764",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:58:54.474569Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:59:14.778Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper validation of DRAM addresses in SMU may\nallow an attacker to overwrite sensitive memory locations within the ASP\npotentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Improper validation of DRAM addresses in SMU may\nallow an attacker to overwrite sensitive memory locations within the ASP\npotentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:52:22.650Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46764",
    "datePublished": "2023-05-09T18:36:24.562Z",
    "dateReserved": "2022-03-31T16:50:27.870Z",
    "dateUpdated": "2025-01-28T15:59:14.778Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26343 (GCVE-0-2021-26343)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 13:25
CWE
  • n/a
Summary
Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.
Impacted products
Vendor Product Version
AMD 3rd Gen EPYC Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.896Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26343",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T13:24:06.614880Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-668",
                "description": "CWE-668 Exposure of Resource to Wrong Sphere",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T13:25:42.403Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.\n\n\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26343",
    "datePublished": "2023-01-10T20:56:34.870Z",
    "dateReserved": "2021-01-29T21:24:26.144Z",
    "dateUpdated": "2025-04-09T13:25:42.403Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26348 (GCVE-0-2021-26348)
Vulnerability from cvelistv5
Published
2022-05-11 16:26
Modified
2024-09-16 16:27
Severity ?
CWE
  • tbd
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
Impacted products
Vendor Product Version
AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.674Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T16:26:16",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1028",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26348",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EPYC\u2122 Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1028",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26348",
    "datePublished": "2022-05-11T16:26:16.451702Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T16:27:57.232Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26355 (GCVE-0-2021-26355)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 14:56
CWE
  • n/a
Summary
Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.
Impacted products
Vendor Product Version
AMD 3rd Gen EPYC Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.057Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26355",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T14:56:03.691250Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-693",
                "description": "CWE-693 Protection Mechanism Failure",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T14:56:35.656Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.\n\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26355",
    "datePublished": "2023-01-10T20:56:37.810Z",
    "dateReserved": "2021-01-29T21:24:26.148Z",
    "dateUpdated": "2025-04-09T14:56:35.656Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26379 (GCVE-0-2021-26379)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:02
Severity ?
Summary
Insufficient input validation of mailbox data in the SMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially leading to a loss of integrity and privilege escalation.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.077Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.8,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26379",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T16:02:33.399399Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T16:02:38.949Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation of mailbox data in the\nSMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially\nleading to a loss of integrity and privilege escalation.\n\n\n\n"
            }
          ],
          "value": "Insufficient input validation of mailbox data in the\nSMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially\nleading to a loss of integrity and privilege escalation.\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:50:00.247Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26379",
    "datePublished": "2023-05-09T18:36:18.303Z",
    "dateReserved": "2021-01-29T21:24:26.158Z",
    "dateUpdated": "2025-01-28T16:02:38.949Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26329 (GCVE-0-2021-26329)
Vulnerability from cvelistv5
Published
2021-11-16 17:57
Modified
2024-09-16 22:24
Severity ?
CWE
  • CWE-130 - Improper Handling of Length Parameter Inconsistency
Summary
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.
Impacted products
Vendor Product Version
AMD 1st Gen AMD EPYC™ Version: unspecified   < NaplesPI-SP3_1.0.0.G
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.294Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "NaplesPI-SP3_1.0.0.G",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-130",
              "description": "CWE-130 Improper Handling of Length Parameter Inconsistency",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T17:57:01",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26329",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "NaplesPI-SP3_1.0.0.G"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-130 Improper Handling of Length Parameter Inconsistency"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26329",
    "datePublished": "2021-11-16T17:57:01.031900Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T22:24:45.920Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12951 (GCVE-0-2020-12951)
Vulnerability from cvelistv5
Published
2021-11-16 18:06
Modified
2024-09-17 01:35
Severity ?
CWE
  • tbd
Summary
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:16:35",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2020-12951",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12951",
    "datePublished": "2021-11-16T18:06:30.578358Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T01:35:37.916Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26320 (GCVE-0-2021-26320)
Vulnerability from cvelistv5
Published
2021-11-16 18:05
Modified
2024-09-16 18:34
Severity ?
CWE
  • CWE-295 - Improper Certificate Validation
Summary
Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP
Impacted products
Vendor Product Version
AMD 1st Gen AMD EPYC™ Version: unspecified   < NaplesPI-SP3_1.0.0.G
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.338Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "NaplesPI-SP3_1.0.0.G",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295 Improper Certificate Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:05:10",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26320",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "NaplesPI-SP3_1.0.0.G"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP"
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-295 Improper Certificate Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26320",
    "datePublished": "2021-11-16T18:05:10.770439Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T18:34:19.728Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26339 (GCVE-0-2021-26339)
Vulnerability from cvelistv5
Published
2022-05-11 16:18
Modified
2024-09-17 01:56
Severity ?
CWE
  • tbd
Summary
A bug in AMD CPU’s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.938Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A bug in AMD CPU\u2019s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T16:18:02",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027 and AMD-SB-1028",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26339",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EPYC\u2122 Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A bug in AMD CPU\u2019s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            },
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027 and AMD-SB-1028",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26339",
    "datePublished": "2022-05-11T16:18:02.079030Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T01:56:55.986Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20525 (GCVE-0-2023-20525)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 15:47
CWE
  • n/a
Summary
Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.913Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20525",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:17:27.182176Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T15:47:21.531Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20525",
    "datePublished": "2023-01-10T20:57:00.713Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2025-04-07T15:47:21.531Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26402 (GCVE-0-2021-26402)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-08 20:27
CWE
  • n/a
Summary
Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.169Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26402",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-08T20:26:11.401792Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-08T20:27:13.237Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.\n\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26402",
    "datePublished": "2023-01-10T20:56:41.784Z",
    "dateReserved": "2021-01-29T21:24:26.169Z",
    "dateUpdated": "2025-04-08T20:27:13.237Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20533 (GCVE-0-2023-20533)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.915Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 series Desktop Processors \u201cMatisse\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors  \u201cChagall\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122  Embedded 5000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:34:28.851Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20533",
    "datePublished": "2023-11-14T18:52:52.106Z",
    "dateReserved": "2022-10-27T18:53:39.739Z",
    "dateUpdated": "2024-08-02T09:05:36.915Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46775 (GCVE-0-2021-46775)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:56
Summary
Improper input validation in ABL may enable an attacker with physical access, to perform arbitrary memory overwrites, potentially leading to a loss of integrity and code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.634Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "PHYSICAL",
              "availabilityImpact": "HIGH",
              "baseScore": 6.8,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-46775",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:56:46.211758Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:56:51.087Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper input validation in ABL may enable an\nattacker with physical access, to perform arbitrary memory overwrites,\npotentially leading to a loss of integrity and code execution.\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Improper input validation in ABL may enable an\nattacker with physical access, to perform arbitrary memory overwrites,\npotentially leading to a loss of integrity and code execution.\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:53:06.367Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46775",
    "datePublished": "2023-05-09T18:36:26.852Z",
    "dateReserved": "2022-03-31T16:50:27.874Z",
    "dateUpdated": "2025-01-28T15:56:51.087Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46762 (GCVE-0-2021-46762)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:00
Summary
Insufficient input validation in the SMU may allow an attacker to corrupt SMU SRAM potentially leading to a loss of integrity or denial of service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.237Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-46762",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T16:00:37.213474Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T16:00:40.217Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service."
            }
          ],
          "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:39:53.600Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46762",
    "datePublished": "2023-05-09T18:36:23.081Z",
    "dateReserved": "2022-03-31T16:50:27.869Z",
    "dateUpdated": "2025-01-28T16:00:40.217Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-23824 (GCVE-0-2022-23824)
Vulnerability from cvelistv5
Published
2022-11-09 20:48
Modified
2025-02-13 16:32
Severity ?
CWE
  • NA
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
Impacted products
Vendor Product Version
AMD AMD Processors Version: Processor various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:51:46.071Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
          },
          {
            "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
          },
          {
            "name": "FEDORA-2022-9f51d13fa3",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
          },
          {
            "name": "FEDORA-2022-53a4a5dd11",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
          },
          {
            "name": "DSA-5378",
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5378"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.gentoo.org/glsa/202402-07"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "AMD Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Processor  various"
            }
          ]
        }
      ],
      "datePublic": "2022-11-08T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "NA",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-09-17T01:23:48.000Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040"
        },
        {
          "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2"
        },
        {
          "name": "FEDORA-2022-9f51d13fa3",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/"
        },
        {
          "name": "FEDORA-2022-53a4a5dd11",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/"
        },
        {
          "name": "DSA-5378",
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.debian.org/security/2023/dsa-5378"
        },
        {
          "url": "https://security.gentoo.org/glsa/202402-07"
        }
      ],
      "source": {
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2022-23824",
    "datePublished": "2022-11-09T20:48:06.826Z",
    "dateReserved": "2022-01-21T00:00:00.000Z",
    "dateUpdated": "2025-02-13T16:32:23.589Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20591 (GCVE-0-2023-20591)
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2025-03-13 16:41
Summary
Improper re-initialization of IOMMU during the DRTM event may permit an untrusted platform configuration to persist, allowing an attacker to read or modify hypervisor memory, potentially resulting in loss of confidentiality, integrity, and availability.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7003_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "milanpi_1.0.0.b",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_9003_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "genoapi_1.0.0.8",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7773x_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "milanpi_1.0.0.b",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_9754s_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "genoapi_1.0.0.8",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20591",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-14T13:13:17.696799Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-665",
                "description": "CWE-665 Improper Initialization",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-03-13T16:41:15.645Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 7003  Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "MilanPI 1.0.0.B",
              "versionType": "PI"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 9004 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "Genoa 1.0.0.8"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7003 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbMilanPI-SP3 1.0.0.7"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 9003 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbGenoaPI-SP5  1.0.0.3"
            }
          ]
        }
      ],
      "datePublic": "2024-08-13T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability.\n\n\n\n\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e"
            }
          ],
          "value": "Improper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-13T16:53:23.681Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20591",
    "datePublished": "2024-08-13T16:53:23.681Z",
    "dateReserved": "2022-10-27T18:53:39.761Z",
    "dateUpdated": "2025-03-13T16:41:15.645Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26356 (GCVE-0-2021-26356)
Vulnerability from cvelistv5
Published
2023-05-09 18:58
Modified
2025-01-28 15:48
Summary
A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.804Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "HIGH",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.4,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26356",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:48:34.459184Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-367",
                "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:48:38.470Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:58:48.108Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4001, AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26356",
    "datePublished": "2023-05-09T18:58:48.108Z",
    "dateReserved": "2021-01-29T21:24:26.149Z",
    "dateUpdated": "2025-01-28T15:48:38.470Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26315 (GCVE-0-2021-26315)
Vulnerability from cvelistv5
Published
2021-11-16 18:12
Modified
2024-09-17 01:21
Severity ?
CWE
  • CWE-345 - Insufficient Verification of Data Authenticity
Summary
When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.391Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-345",
              "description": "CWE-345 Insufficient Verification of Data Authenticity",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:12:07",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26315",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-345 Insufficient Verification of Data Authenticity"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26315",
    "datePublished": "2021-11-16T18:12:07.291241Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T01:21:40.952Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26336 (GCVE-0-2021-26336)
Vulnerability from cvelistv5
Published
2021-11-16 18:04
Modified
2024-09-16 17:33
Severity ?
CWE
  • tbd
Summary
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.912Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:44:49",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26336",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26336",
    "datePublished": "2021-11-16T18:04:08.054768Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T17:33:06.189Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26332 (GCVE-0-2021-26332)
Vulnerability from cvelistv5
Published
2022-05-10 18:26
Modified
2024-09-16 17:23
Severity ?
CWE
  • tbd
Summary
Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.907Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-10T18:26:52",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-06T20:00:00.000Z",
          "ID": "CVE-2021-26332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26332",
    "datePublished": "2022-05-10T18:26:52.115269Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T17:23:38.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12988 (GCVE-0-2020-12988)
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 16:33
Severity ?
CWE
  • TBD
Summary
A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.981Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "N/A"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "TBD",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-09T22:05:41",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:30:00.000Z",
          "ID": "CVE-2020-12988",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "N/A"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "TBD"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12988",
    "datePublished": "2021-06-11T21:50:22.301328Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T16:33:44.366Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46763 (GCVE-0-2021-46763)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:00
Summary
Insufficient input validation in the SMU may enable a privileged attacker to write beyond the intended bounds of a shared memory buffer potentially leading to a loss of integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.477Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-46763",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:59:51.899664Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T16:00:03.817Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in the SMU may\nenable a privileged attacker to write beyond the intended bounds of a shared\nmemory buffer potentially leading to a loss of integrity.\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Insufficient input validation in the SMU may\nenable a privileged attacker to write beyond the intended bounds of a shared\nmemory buffer potentially leading to a loss of integrity.\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:52:03.128Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46763",
    "datePublished": "2023-05-09T18:36:23.834Z",
    "dateReserved": "2022-03-31T16:50:27.870Z",
    "dateUpdated": "2025-01-28T16:00:03.817Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-23830 (GCVE-0-2022-23830)
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 03:51
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:51:45.987Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPY\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "LOW",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:41:52.383Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2022-23830",
    "datePublished": "2023-11-14T18:53:28.408Z",
    "dateReserved": "2022-01-21T17:20:55.781Z",
    "dateUpdated": "2024-08-03T03:51:45.987Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26338 (GCVE-0-2021-26338)
Vulnerability from cvelistv5
Published
2021-11-16 17:53
Modified
2024-09-17 01:56
Severity ?
CWE
  • CWE-284 - Improper Access Control
Summary
Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.
Impacted products
Vendor Product Version
AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.933Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-284",
              "description": "CWE-284 Improper Access Control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T17:53:50",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26338",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-284 Improper Access Control"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26338",
    "datePublished": "2021-11-16T17:53:50.233501Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T01:56:07.563Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26397 (GCVE-0-2021-26397)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:01
Summary
Insufficient address validation, may allow an attacker with a compromised ABL and UApp to corrupt sensitive memory locations potentially resulting in a loss of integrity or availability.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.294Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.1,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26397",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T16:01:44.320117Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T16:01:49.226Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:51:10.456Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26397",
    "datePublished": "2023-05-09T18:36:19.135Z",
    "dateReserved": "2021-01-29T21:24:26.165Z",
    "dateUpdated": "2025-01-28T16:01:49.226Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20532 (GCVE-0-2023-20532)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:33
CWE
  • n/a
Summary
Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.239Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "LOW",
              "baseScore": 5.3,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20532",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:55:46.581295Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:33:14.880Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20532",
    "datePublished": "2023-01-10T20:57:08.762Z",
    "dateReserved": "2022-10-27T18:53:39.739Z",
    "dateUpdated": "2025-04-07T18:33:14.880Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-21980 (GCVE-0-2024-21980)
Vulnerability from cvelistv5
Published
2024-08-05 16:06
Modified
2024-08-05 21:00
CWE
  • CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7003_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "milanpi_1.0.0.9_sp3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_9003_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "genoapi_1.0.0.7_sp5",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7773x_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "milanpi_1.0.0.d",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_9754s_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "genoapi_1.0.0.c",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-21980",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-05T20:52:33.557459Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-05T21:00:57.665Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI 1.0.0.D",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "GenoaPI 1.0.0.C",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "EmbMilanPI-SP3 1.0.0.9",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 9003",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "EmbGenoaPI-SP5 1.0.0.7",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        }
      ],
      "datePublic": "2024-08-05T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest\u0027s memory or UMC seed resulting in loss of confidentiality and integrity.\u003c/span\u003e\n\n\u003c/span\u003e"
            }
          ],
          "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest\u0027s memory or UMC seed resulting in loss of confidentiality and integrity."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 7.9,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-05T16:06:36.216Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2024-21980",
    "datePublished": "2024-08-05T16:06:36.216Z",
    "dateReserved": "2024-01-03T16:43:30.197Z",
    "dateUpdated": "2024-08-05T21:00:57.665Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26335 (GCVE-0-2021-26335)
Vulnerability from cvelistv5
Published
2021-11-16 18:08
Modified
2024-09-16 18:24
Severity ?
CWE
  • tbd
Summary
Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.907Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:25:06",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26335",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26335",
    "datePublished": "2021-11-16T18:08:39.387145Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T18:24:42.318Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26331 (GCVE-0-2021-26331)
Vulnerability from cvelistv5
Published
2021-11-16 18:09
Modified
2024-09-16 21:03
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.
Impacted products
Vendor Product Version
AMD 1st Gen AMD EPYC™ Version: unspecified   < NaplesPI-SP3_1.0.0.G
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.953Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "NaplesPI-SP3_1.0.0.G",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:09:35",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26331",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "NaplesPI-SP3_1.0.0.G"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26331",
    "datePublished": "2021-11-16T18:09:35.653452Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T21:03:02.452Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12946 (GCVE-0-2020-12946)
Vulnerability from cvelistv5
Published
2021-11-16 18:01
Modified
2024-09-17 00:55
Severity ?
CWE
  • tbd
Summary
Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.980Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:29:08",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2020-12946",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12946",
    "datePublished": "2021-11-16T18:01:28.187239Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T00:55:32.489Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20594 (GCVE-0-2023-20594)
Vulnerability from cvelistv5
Published
2023-09-20 17:27
Modified
2025-06-27 21:41
Severity ?
CWE
  • CWE-824 - Access of Uninitialized Pointer
Summary
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors “Matisse” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3 Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3 Version: various
Create a notification for this product.
   AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6 Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics "Rembrandt" Version: various
Create a notification for this product.
   AMD Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics "Rembrandt-R" Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics "Barcelo" Version: various
Create a notification for this product.
   AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” Version: various
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded 7000 Create a notification for this product.
   AMD AMD Ryzen™ Embedded V3000 Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.973Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20594",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-09-25T15:25:52.143486Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-09-25T15:26:01.771Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics  \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics \u201cRenoir\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors \u201cChagall\u201d WS SP3",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d FP6",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Mobile Processors with Radeon\u2122 Graphics \"Rembrandt\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7035 Series Mobile Processors with Radeon\u2122 Graphics \"Rembrandt-R\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \"Barcelo\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7030 Series Mobile Processors with Radeon\u2122 Graphics \u201cBarcelo-R\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded 7000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "EmbeddedAM5PI   1.0.0.1"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD Ryzen\u2122 Embedded V3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "unaffected",
              "version": "Embedded-PI_FP7r2 1.0.0.B"
            }
          ]
        }
      ],
      "datePublic": "2023-09-20T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eImproper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.\u003c/span\u003e"
            }
          ],
          "value": "Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-824",
              "description": "CWE-824 Access of Uninitialized Pointer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-06-27T21:41:58.197Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4007",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20594",
    "datePublished": "2023-09-20T17:27:59.742Z",
    "dateReserved": "2022-10-27T18:53:39.762Z",
    "dateUpdated": "2025-06-27T21:41:58.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46756 (GCVE-0-2021-46756)
Vulnerability from cvelistv5
Published
2023-05-09 19:00
Modified
2025-01-28 15:38
Severity ?
Summary
Insufficient validation of inputs in SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious Uapp or ABL to send malformed or invalid syscall to the bootloader resulting in a potential denial of service and loss of integrity.
Impacted products
Vendor Product Version
AMD Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ 2000 Series Desktop Processors “Pinnacle Ridge” Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4 Version: Various
Create a notification for this product.
   AMD 2nd Gen AMD Ryzen™ Threadripper™ Processors “Colfax” Version: various
Create a notification for this product.
   AMD 3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock” Version: various
Create a notification for this product.
   AMD Ryzen™ 2000 Series Mobile Processors “Raven Ridge” FP5 Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso” Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD 1st Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.446Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 9.1,
              "baseSeverity": "CRITICAL",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-46756",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:38:16.732242Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:38:19.211Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 Series Desktop Processors \u201cPinnacle Ridge\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop processor with Radeon\u2122 Graphics  \u201cCezanne\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cColfax\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile processors with Radeon\u2122 Graphics \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T19:00:35.599Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4001, AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46756",
    "datePublished": "2023-05-09T19:00:35.599Z",
    "dateReserved": "2022-03-31T16:50:27.868Z",
    "dateUpdated": "2025-01-28T15:38:19.211Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-31355 (GCVE-0-2023-31355)
Vulnerability from cvelistv5
Published
2024-08-05 16:04
Modified
2024-08-06 14:58
CWE
  • CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-31355",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-06T14:07:12.426239Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-06T14:58:40.899Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI 1.0.0.D",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "GenoaPI 1.0.0.C",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "EmbMilanPI-SP3 1.0.0.9",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 9003",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "EmbGenoaPI-SP5 1.0.0.7",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        }
      ],
      "datePublic": "2024-08-05T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest\u0027s UMC seed potentially allowing reading of memory from a decommissioned guest.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e"
            }
          ],
          "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest\u0027s UMC seed potentially allowing reading of memory from a decommissioned guest."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-119",
              "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-05T16:04:24.813Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-31355",
    "datePublished": "2024-08-05T16:04:24.813Z",
    "dateReserved": "2023-04-27T15:25:41.428Z",
    "dateUpdated": "2024-08-06T14:58:40.899Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26330 (GCVE-0-2021-26330)
Vulnerability from cvelistv5
Published
2021-11-16 18:19
Modified
2024-09-16 18:12
Severity ?
CWE
  • CWE-122 - Heap-based Buffer Overflow
Summary
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
Impacted products
Vendor Product Version
AMD 1st Gen AMD EPYC™ Version: unspecified   < NaplesPI-SP3_1.0.0.G
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Version: unspecified   < RomePI-SP3_1.0.0.C
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.947Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "NaplesPI-SP3_1.0.0.G",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "2nd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "RomePI-SP3_1.0.0.C",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        },
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-122",
              "description": "CWE-122 Heap-based Buffer Overflow",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:19:29",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26330",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "NaplesPI-SP3_1.0.0.G"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "2nd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "RomePI-SP3_1.0.0.C"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-122 Heap-based Buffer Overflow"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26330",
    "datePublished": "2021-11-16T18:19:29.476922Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T18:12:54.960Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26326 (GCVE-0-2021-26326)
Vulnerability from cvelistv5
Published
2021-11-16 17:52
Modified
2024-09-16 17:53
Severity ?
CWE
  • CWE-665 - Improper Initialization
Summary
Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.339Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-665",
              "description": "CWE-665 Improper Initialization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T17:52:14",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26326",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-665 Improper Initialization"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26326",
    "datePublished": "2021-11-16T17:52:14.020889Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T17:53:16.999Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46769 (GCVE-0-2021-46769)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:57
Summary
Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to execute arbitrary DMA copies, which can lead to code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.984Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 8.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-46769",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:57:47.847749Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:57:52.765Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:52:44.759Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46769",
    "datePublished": "2023-05-09T18:36:25.695Z",
    "dateReserved": "2022-03-31T16:50:27.872Z",
    "dateUpdated": "2025-01-28T15:57:52.765Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26312 (GCVE-0-2021-26312)
Vulnerability from cvelistv5
Published
2021-11-16 17:55
Modified
2024-09-16 17:54
Severity ?
CWE
  • CWE-665 - Improper Initialization
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.142Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-665",
              "description": "CWE-665 Improper Initialization",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T16:30:46",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027 and AMD-SB-1028",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26312",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EPYC\u2122 Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-665 Improper Initialization"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            },
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027 and AMD-SB-1028",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26312",
    "datePublished": "2021-11-16T17:55:24.198997Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T17:54:14.669Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20526 (GCVE-0-2023-20526)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Summary
Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.942Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:43:52.998Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20526",
    "datePublished": "2023-11-14T18:52:41.992Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2024-08-02T09:05:36.942Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26354 (GCVE-0-2021-26354)
Vulnerability from cvelistv5
Published
2023-05-09 18:58
Modified
2025-01-28 15:50
Summary
Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.
Impacted products
Vendor Product Version
AMD Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ 2000 Series Desktop Processors “Pinnacle Ridge” Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM4 Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop processor with Radeon™ Graphics “Cezanne” AM4 Version: Various
Create a notification for this product.
   AMD 2nd Gen AMD Ryzen™ Threadripper™ Processors “Colfax” Version: various
Create a notification for this product.
   AMD 3rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDT Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ PRO Processors “Chagall” WS Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock” Version: various
Create a notification for this product.
   AMD Ryzen™ 2000 Series Mobile Processors “Raven Ridge” FP5 Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso” Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Mobile Processors with Radeon™ Graphics “Renoir” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Mobile processors with Radeon™ Graphics “Cezanne” Version: various
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.140Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "NONE",
              "baseScore": 5.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26354",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:50:31.473767Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-120",
                "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:50:35.057Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 Series Desktop Processors \u201cPinnacle Ridge\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop processor with Radeon\u2122 Graphics  \u201cCezanne\u201d AM4",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cColfax\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics   \u201cPollock\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Mobile processors with Radeon\u2122 Graphics \u201cCezanne\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient bounds checking in ASP may allow an\nattacker to issue a system call from a compromised ABL which may cause\narbitrary memory values to be initialized to zero, potentially leading to a\nloss of integrity.\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Insufficient bounds checking in ASP may allow an\nattacker to issue a system call from a compromised ABL which may cause\narbitrary memory values to be initialized to zero, potentially leading to a\nloss of integrity.\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:58:37.664Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4001, AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26354",
    "datePublished": "2023-05-09T18:58:37.664Z",
    "dateReserved": "2021-01-29T21:24:26.148Z",
    "dateUpdated": "2025-01-28T15:50:35.057Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12966 (GCVE-0-2020-12966)
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-17 01:06
Severity ?
CWE
  • TBD
Summary
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
Impacted products
Vendor Product Version
AMD 1st/2nd/3rd Gen AMD EPYC™ Processors Version: unspecified   < undefined
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:19.042Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"
          },
          {
            "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "undefined",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-08-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "TBD",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-08-08T17:06:45",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"
        },
        {
          "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1013",
        "discovery": "EXTERNAL"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-08-10T19:30:00.000Z",
          "ID": "CVE-2020-12966",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": ""
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "TBD"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"
            },
            {
              "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1013",
          "discovery": "EXTERNAL"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12966",
    "datePublished": "2022-02-04T22:29:12.748016Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-17T01:06:34.720Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20527 (GCVE-0-2023-20527)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 15:47
CWE
  • n/a
Summary
Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.888Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20527",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:15:59.447266Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T15:47:00.818Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.\u003cbr\u003e"
            }
          ],
          "value": "Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20527",
    "datePublished": "2023-01-10T20:57:02.034Z",
    "dateReserved": "2022-10-27T18:53:39.738Z",
    "dateUpdated": "2025-04-07T15:47:00.818Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26337 (GCVE-0-2021-26337)
Vulnerability from cvelistv5
Published
2021-11-16 18:24
Modified
2024-09-17 03:49
Severity ?
CWE
  • tbd
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:23.926Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-12T17:42:04",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26337",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26337",
    "datePublished": "2021-11-16T18:24:01.483891Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T03:49:09.083Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26342 (GCVE-0-2021-26342)
Vulnerability from cvelistv5
Published
2022-05-11 16:21
Modified
2024-09-16 16:32
Severity ?
CWE
  • tbd
Summary
In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.
Impacted products
Vendor Product Version
AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.602Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T16:21:04",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1028",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2021-26342",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "EPYC\u2122 Processors",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1028",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26342",
    "datePublished": "2022-05-11T16:21:04.403325Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T16:32:42.078Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20592 (GCVE-0-2023-20592)
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-10-11 18:07
Severity ?
Summary
Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.266Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20592",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-11T17:51:51.383280Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-11T18:07:49.421Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors ",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-11-14T18:54:13.255Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3005",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20592",
    "datePublished": "2023-11-14T18:54:13.255Z",
    "dateReserved": "2022-10-27T18:53:39.762Z",
    "dateUpdated": "2024-10-11T18:07:49.421Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26324 (GCVE-0-2021-26324)
Vulnerability from cvelistv5
Published
2022-05-10 18:27
Modified
2024-09-16 17:54
Severity ?
CWE
  • tbd
Summary
A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.327Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2022-05-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-10T18:27:30",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-06T20:00:00.000Z",
          "ID": "CVE-2021-26324",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26324",
    "datePublished": "2022-05-10T18:27:30.491069Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T17:54:12.083Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-46774 (GCVE-0-2021-46774)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-10-11 18:07
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 series Desktop Processors “Matisse" Version: various
Create a notification for this product.
   AMD AMD Ryzen™ 5000 Series Desktop Processors “Vermeer” Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS Version: various
Create a notification for this product.
   AMD 1st Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 4th Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD AMD EPYC™ Embedded 3000 Version: various
Create a notification for this product.
   AMD AMD EPYC™ Embedded 7002 Version: various
Create a notification for this product.
   AMD AMD EPYC™ Embedded 7003 Version: various
Create a notification for this product.
   AMD AMD Ryzen™ Embedded 5000 Version: various
Create a notification for this product.
   AMD AMD EPYC™ Embedded 7002 Version: various
Create a notification for this product.
   AMD AMD EPYC™ Embedded 3000 Version: various
Create a notification for this product.
   AMD AMD EPYC™ Embedded 7003 Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T05:17:42.622Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2021-46774",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-10-11T17:51:52.542045Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-10-11T18:07:59.642Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 series Desktop Processors \u201cMatisse\"",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors  \u201cChagall\u201d WS",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD Ryzen\u2122  Embedded 5000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:31:43.449Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-46774",
    "datePublished": "2023-11-14T18:52:11.012Z",
    "dateReserved": "2022-03-31T16:50:27.874Z",
    "dateUpdated": "2024-10-11T18:07:59.642Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26396 (GCVE-0-2021-26396)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 14:54
CWE
  • n/a
Summary
Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.
Impacted products
Vendor Product Version
AMD 3rd Gen EPYC Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:25.145Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "LOW",
              "baseScore": 4.4,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "NONE",
              "integrityImpact": "LOW",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26396",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T14:54:48.208922Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-345",
                "description": "CWE-345 Insufficient Verification of Data Authenticity",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T14:54:52.802Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\n\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26396",
    "datePublished": "2023-01-10T20:56:39.130Z",
    "dateReserved": "2021-01-29T21:24:26.165Z",
    "dateUpdated": "2025-04-09T14:54:52.802Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2022-23818 (GCVE-0-2022-23818)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:55
Summary
Insufficient input validation on the model specific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest memory integrity.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T03:51:46.083Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "HIGH",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2022-23818",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-01-28T15:55:48.519453Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "description": "CWE-noinfo Not enough information",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-01-28T15:55:54.421Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-05-09T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-09T18:53:23.338Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2022-23818",
    "datePublished": "2023-05-09T18:36:28.387Z",
    "dateReserved": "2022-01-21T17:20:55.777Z",
    "dateUpdated": "2025-01-28T15:55:54.421Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-12944 (GCVE-0-2020-12944)
Vulnerability from cvelistv5
Published
2021-11-16 18:17
Modified
2024-09-16 17:04
Severity ?
CWE
  • tbd
Summary
Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T12:11:18.939Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Ryzen\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "product": "Athlon\u2122 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2022-05-10T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "tbd",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T15:27:11",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1027",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2022-05-10T20:00:00.000Z",
          "ID": "CVE-2020-12944",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Ryzen\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "Athlon\u2122 Series",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "=",
                            "version_value": "various"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "tbd"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1027",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2020-12944",
    "datePublished": "2021-11-16T18:17:24.768272Z",
    "dateReserved": "2020-05-15T00:00:00",
    "dateUpdated": "2024-09-16T17:04:09.696Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26398 (GCVE-0-2021-26398)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 14:38
CWE
  • n/a
Summary
Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.878Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26398",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T14:37:21.765798Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T14:38:06.009Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA ",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen EPYC ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.\u003cbr\u003e\u003cbr\u003e"
            }
          ],
          "value": "Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.\n\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26398",
    "datePublished": "2023-01-10T20:56:40.452Z",
    "dateReserved": "2021-01-29T21:24:26.167Z",
    "dateUpdated": "2025-04-09T14:38:06.009Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20531 (GCVE-0-2023-20531)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:33
CWE
  • n/a
Summary
Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.887Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "HIGH",
              "baseScore": 7.5,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "NONE",
              "integrityImpact": "NONE",
              "privilegesRequired": "NONE",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20531",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-07T15:56:38.825466Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-119",
                "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-07T18:33:55.600Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.\n"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20531",
    "datePublished": "2023-01-10T20:57:07.471Z",
    "dateReserved": "2022-10-27T18:53:39.739Z",
    "dateUpdated": "2025-04-07T18:33:55.600Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20569 (GCVE-0-2023-20569)
Vulnerability from cvelistv5
Published
2023-08-08 17:02
Modified
2024-09-23 03:18
Severity ?
Summary
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
Impacted products
Vendor Product Version
AMD Ryzen™ 3000 Series Desktop Processors Version: various
Create a notification for this product.
   AMD Ryzen™ PRO 3000 Series Desktop Processors Version: various
Create a notification for this product.
   AMD Ryzen™ 3000 Series Desktop Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD Ryzen™ PRO 3000 Series Processors with Radeon™ Vega Graphics Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics Version: various
Create a notification for this product.
   AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD Ryzen™ PRO 4000 Series Desktop Processors Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processors Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Desktop Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   Ryzen™ PRO 5000 Series Desktop Processors Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ 2000 Series Processors Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ 5000 Series Processors Version: various
Create a notification for this product.
   AMD Ryzen™ Threadripper™ 3000 Series Processors Version: various
Create a notification for this product.
   AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD Ryzen™ PRO 5000 Series Processors Version: various
Create a notification for this product.
   AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD Ryzen™ PRO 6000 Series Processors Version: various
Create a notification for this product.
   AMD Ryzen™ 7040 Series Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD Ryzen™ 7000 Series Processors Version: various
Create a notification for this product.
   AMD Ryzen™ 7000 Series Processors with Radeon™ Graphics Version: various
Create a notification for this product.
   AMD 1st Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 2nd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 3rd Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
   AMD 4th Gen AMD EPYC™ Processors Version: various
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-09-23T03:18:32.598Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://xenbits.xen.org/xsa/advisory-434.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://comsec.ethz.ch/research/microarch/inception/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5475"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240605-0006/"
          }
        ],
        "title": "CVE Program Container",
        "x_generator": {
          "engine": "ADPogram 0.0.1"
        }
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 4000 Series Desktop Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Desktop Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 5000 Series Desktop Processors",
          "vendor": " ",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": " Ryzen\u2122 Threadripper\u2122 5000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 5000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 PRO 6000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7000 Series Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": " 1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD ",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122  Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122  Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-08-08T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA side channel vulnerability on some \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eof the \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAMD CPUs may allow an attacker to influence \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ethe \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ereturn address prediction\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. This may\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e result in speculative execution at an attacker-controlled\u202f\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eaddress\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e, potentially leading to information disclosure.\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-08-08T17:02:11.318Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005"
        },
        {
          "url": "http://xenbits.xen.org/xsa/advisory-434.html"
        },
        {
          "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4"
        },
        {
          "url": "https://comsec.ethz.ch/research/microarch/inception/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/"
        },
        {
          "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html"
        },
        {
          "url": "https://www.debian.org/security/2023/dsa-5475"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/"
        },
        {
          "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/"
        },
        {
          "url": "https://security.netapp.com/advisory/ntap-20240605-0006/"
        }
      ],
      "source": {
        "advisory": "AMD-SB-7005",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20569",
    "datePublished": "2023-08-08T17:02:11.318Z",
    "dateReserved": "2022-10-27T18:53:39.754Z",
    "dateUpdated": "2024-09-23T03:18:32.598Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26345 (GCVE-0-2021-26345)
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 20:26
Summary
Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:26:24.909Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e"
            }
          ],
          "value": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:38:22.990Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3002, AMD-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26345",
    "datePublished": "2023-11-14T18:53:20.979Z",
    "dateReserved": "2021-01-29T21:24:26.145Z",
    "dateUpdated": "2024-08-03T20:26:24.909Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20575 (GCVE-0-2023-20575)
Vulnerability from cvelistv5
Published
2023-07-11 18:29
Modified
2024-11-27 16:01
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.892Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "NETWORK",
              "availabilityImpact": "NONE",
              "baseScore": 6.5,
              "baseSeverity": "MEDIUM",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "NONE",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2023-20575",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-11-27T15:57:15.725721Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-203",
                "description": "CWE-203 Observable Discrepancy",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-11-27T16:01:14.610Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "packageName": " ",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "x86"
          ],
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        }
      ],
      "datePublic": "2023-07-11T16:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n"
            }
          ],
          "value": "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n"
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-11T18:29:02.607Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004"
        }
      ],
      "source": {
        "advisory": "AMD-SB-3004",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20575",
    "datePublished": "2023-07-11T18:29:02.607Z",
    "dateReserved": "2022-10-27T18:53:39.756Z",
    "dateUpdated": "2024-11-27T16:01:14.610Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2024-21978 (GCVE-0-2024-21978)
Vulnerability from cvelistv5
Published
2024-08-05 16:05
Modified
2024-08-05 17:36
CWE
  • CWE-20 - Improper Input Validation
Summary
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7003_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "milanpi_1.0.0.9_sp3",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_9003_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "genoapi_1.0.0.7_sp5",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_7773x_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "milanpi_1.0.0.d",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*",
              "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "epyc_9754s_firmware",
            "vendor": "amd",
            "versions": [
              {
                "lessThan": "genoapi_1.0.0.c",
                "status": "affected",
                "version": "0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2024-21978",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-08-05T17:01:18.171419Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-08-05T17:36:02.731Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI 1.0.0.D",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "4th Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "GenoaPI 1.0.0.C",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "EmbMilanPI-SP3 1.0.0.9",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        },
        {
          "defaultStatus": "affected",
          "product": "AMD EPYC\u2122 Embedded 9003",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "EmbGenoaPI-SP5 1.0.0.7",
              "status": "affected",
              "version": "various",
              "versionType": "Platform Initialization"
            }
          ]
        }
      ],
      "datePublic": "2024-08-05T16:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e"
            }
          ],
          "value": "Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "NONE",
            "baseScore": 6,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-08-05T16:05:34.019Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2024-21978",
    "datePublished": "2024-08-05T16:05:34.019Z",
    "dateReserved": "2024-01-03T16:43:30.197Z",
    "dateUpdated": "2024-08-05T17:36:02.731Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26316 (GCVE-0-2021-26316)
Vulnerability from cvelistv5
Published
2023-01-10 19:46
Modified
2025-04-09 15:19
CWE
  • n/a
Summary
Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.402Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "cvssV3_1": {
              "attackComplexity": "LOW",
              "attackVector": "LOCAL",
              "availabilityImpact": "HIGH",
              "baseScore": 7.8,
              "baseSeverity": "HIGH",
              "confidentialityImpact": "HIGH",
              "integrityImpact": "HIGH",
              "privilegesRequired": "LOW",
              "scope": "UNCHANGED",
              "userInteraction": "NONE",
              "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
              "version": "3.1"
            }
          },
          {
            "other": {
              "content": {
                "id": "CVE-2021-26316",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-04-09T15:18:38.823141Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-20",
                "description": "CWE-20 Improper Input Validation",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-04-09T15:19:17.090Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "affected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen 5000 Series ",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen 2000 Series",
          "vendor": " AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "Ryzen 3000 Series",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA ",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen EPYC ",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "Various "
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "AGESA",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen EPYC",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various "
            }
          ]
        }
      ],
      "datePublic": "2023-01-10T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution."
            }
          ],
          "value": "Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-01-11T07:01:59.843Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1031, AMD-SB-1032",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26316",
    "datePublished": "2023-01-10T19:46:46.575Z",
    "dateReserved": "2021-01-29T21:24:26.137Z",
    "dateUpdated": "2025-04-09T15:19:17.090Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26325 (GCVE-0-2021-26325)
Vulnerability from cvelistv5
Published
2021-11-16 18:23
Modified
2024-09-16 16:28
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:23:15",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26325",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26325",
    "datePublished": "2021-11-16T18:23:15.960316Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-16T16:28:08.526Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-26327 (GCVE-0-2021-26327)
Vulnerability from cvelistv5
Published
2021-11-16 18:18
Modified
2024-09-17 02:42
Severity ?
CWE
  • CWE-20 - Improper Input Validation
Summary
Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.
Impacted products
Vendor Product Version
AMD 3rd Gen AMD EPYC™ Version: unspecified   < MilanPI-SP3_1.0.0.4
Create a notification for this product.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T20:19:20.137Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "3rd Gen AMD EPYC\u2122",
          "vendor": "AMD",
          "versions": [
            {
              "lessThan": "MilanPI-SP3_1.0.0.4",
              "status": "affected",
              "version": "unspecified",
              "versionType": "custom"
            }
          ]
        }
      ],
      "datePublic": "2021-11-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-20",
              "description": "CWE-20 Improper Input Validation",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-11-16T18:18:25",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
        }
      ],
      "source": {
        "advisory": "AMD-SB-1021",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@amd.com",
          "DATE_PUBLIC": "2021-11-09T20:00:00.000Z",
          "ID": "CVE-2021-26327",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "3rd Gen AMD EPYC\u2122",
                      "version": {
                        "version_data": [
                          {
                            "version_affected": "\u003c",
                            "version_value": "MilanPI-SP3_1.0.0.4"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "AMD"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality."
            }
          ]
        },
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-20 Improper Input Validation"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021",
              "refsource": "MISC",
              "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
            }
          ]
        },
        "source": {
          "advisory": "AMD-SB-1021",
          "discovery": "UNKNOWN"
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2021-26327",
    "datePublished": "2021-11-16T18:18:25.899504Z",
    "dateReserved": "2021-01-29T00:00:00",
    "dateUpdated": "2024-09-17T02:42:07.509Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Summary
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.
Impacted products
Vendor Product Version
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "AMD System Management Unit (SMU) contiene un problema potencial en el que un usuario malicioso puede ser capaz de manipular las entradas del buz\u00f3n de correo, conllevando a una ejecuci\u00f3n de c\u00f3digo arbitrario"
    }
  ],
  "id": "CVE-2021-26331",
  "lastModified": "2024-11-21T05:56:07.273",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-16T19:15:08.197",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "psirt@amd.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-12-10 22:15
Modified
2024-11-21 05:56
Summary
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
Impacted products
Vendor Product Version
amd epyc_7001_firmware -
amd epyc_7001 -
amd epyc_7232p_firmware -
amd epyc_7232p -
amd epyc_7251_firmware -
amd epyc_7251 -
amd epyc_7261_firmware -
amd epyc_7261 -
amd epyc_7252_firmware -
amd epyc_7252 -
amd epyc_74f3_firmware -
amd epyc_74f3 -
amd epyc_7501_firmware -
amd epyc_7501 -
amd epyc_7502_firmware -
amd epyc_7502 -
amd epyc_7502p_firmware -
amd epyc_7502p -
amd epyc_7513_firmware -
amd epyc_7513 -
amd epyc_7532_firmware -
amd epyc_7532 -
amd epyc_7542_firmware -
amd epyc_7542 -
amd epyc_7543_firmware -
amd epyc_7543 -
amd epyc_7543p_firmware -
amd epyc_7543p -
amd epyc_7551_firmware -
amd epyc_7551 -
amd epyc_7551p_firmware -
amd epyc_7551p -
amd epyc_7552_firmware -
amd epyc_7552 -
amd epyc_75f3_firmware -
amd epyc_75f3 -
amd epyc_7601_firmware -
amd epyc_7601 -
amd epyc_7642_firmware -
amd epyc_7642 -
amd epyc_7643_firmware -
amd epyc_7643 -
amd epyc_7662_firmware -
amd epyc_7662 -
amd epyc_7663_firmware -
amd epyc_7663 -
amd epyc_7702p_firmware -
amd epyc_7702p -
amd epyc_7702_firmware -
amd epyc_7702 -
amd epyc_7713_firmware -
amd epyc_7713 -
amd epyc_7713p_firmware -
amd epyc_7713p -
amd epyc_7742_firmware -
amd epyc_7742 -
amd epyc_7763_firmware -
amd epyc_7763 -
amd epyc_7f32_firmware -
amd epyc_7f32 -
amd epyc_7f52_firmware -
amd epyc_7f52 -
amd epyc_7262_firmware -
amd epyc_7262 -
amd epyc_7272_firmware -
amd epyc_7272 -
amd epyc_7281_firmware -
amd epyc_7281 -
amd epyc_7282_firmware -
amd epyc_7282 -
amd epyc_72f3_firmware -
amd epyc_72f3 -
amd epyc_7302_firmware -
amd epyc_7302 -
amd epyc_7301_firmware -
amd epyc_7301 -
amd epyc_7302p_firmware -
amd epyc_7302p -
amd epyc_7313_firmware -
amd epyc_7313 -
amd epyc_7313p_firmware -
amd epyc_7313p -
amd epyc_7343_firmware -
amd epyc_7343 -
amd epyc_7351_firmware -
amd epyc_7351 -
amd epyc_7351p_firmware -
amd epyc_7351p -
amd epyc_7352_firmware -
amd epyc_7352 -
amd epyc_7371_firmware -
amd epyc_7371 -
amd epyc_73f3_firmware -
amd epyc_73f3 -
amd epyc_7401_firmware -
amd epyc_7401 -
amd epyc_7401p_firmware -
amd epyc_7401p -
amd epyc_7402_firmware -
amd epyc_7402 -
amd epyc_7402p_firmware -
amd epyc_7402p -
amd epyc_7413_firmware -
amd epyc_7413 -
amd epyc_7443p_firmware -
amd epyc_7443p -
amd epyc_7443_firmware -
amd epyc_7443 -
amd epyc_7451_firmware -
amd epyc_7451 -
amd epyc_7452_firmware -
amd epyc_7452 -
amd epyc_7453_firmware -
amd epyc_7453 -
amd epyc_7f72_firmware -
amd epyc_7f72 -
amd epyc_7h12_firmware -
amd epyc_7h12 -
amd epyc_embedded_3101_firmware -
amd epyc_embedded_3101 -
amd epyc_embedded_3151_firmware -
amd epyc_embedded_3151 -
amd epyc_embedded_3201_firmware -
amd epyc_embedded_3201 -
amd epyc_embedded_3251_firmware -
amd epyc_embedded_3251 -
amd epyc_embedded_3255_firmware -
amd epyc_embedded_3255 -
amd epyc_embedded_3351_firmware -
amd epyc_embedded_3351 -
amd epyc_embedded_3451_firmware -
amd epyc_embedded_3451 -
amd epyc_embedded_7601_firmware -
amd epyc_embedded_7601 -
amd epyc_embedded_7551_firmware -
amd epyc_embedded_7551 -
amd epyc_embedded_7501_firmware -
amd epyc_embedded_7501 -
amd epyc_embedded_7451_firmware -
amd epyc_embedded_7451 -
amd epyc_embedded_7401_firmware -
amd epyc_embedded_7401 -
amd epyc_embedded_7371_firmware -
amd epyc_embedded_7371 -
amd epyc_embedded_7351_firmware -
amd epyc_embedded_7351 -
amd epyc_embedded_7301_firmware -
amd epyc_embedded_7301 -
amd epyc_embedded_7281_firmware -
amd epyc_embedded_7281 -
amd epyc_embedded_7261_firmware -
amd epyc_embedded_7261 -
amd epyc_embedded_7251_firmware -
amd epyc_embedded_7251 -
amd epyc_embedded_755p_firmware -
amd epyc_embedded_755p -
amd epyc_embedded_740p_firmware -
amd epyc_embedded_740p -
amd epyc_embedded_735p_firmware -
amd epyc_embedded_735p -
amd epyc_embedded_7h12_firmware -
amd epyc_embedded_7h12 -
amd epyc_embedded_7742_firmware -
amd epyc_embedded_7742 -
amd epyc_embedded_7702_firmware -
amd epyc_embedded_7702 -
amd epyc_embedded_7662_firmware -
amd epyc_embedded_7662 -
amd epyc_embedded_7642_firmware -
amd epyc_embedded_7642 -
amd epyc_embedded_7552_firmware -
amd epyc_embedded_7552 -
amd epyc_embedded_7542_firmware -
amd epyc_embedded_7542 -
amd epyc_embedded_7532_firmware -
amd epyc_embedded_7532 -
amd epyc_embedded_7502_firmware -
amd epyc_embedded_7502 -
amd epyc_embedded_7452_firmware -
amd epyc_embedded_7452 -
amd epyc_embedded_7f72_firmware -
amd epyc_embedded_7f72 -
amd epyc_embedded_7402_firmware -
amd epyc_embedded_7402 -
amd epyc_embedded_7352_firmware -
amd epyc_embedded_7352 -
amd epyc_embedded_7f52_firmware -
amd epyc_embedded_7f52 -
amd epyc_embedded_7302_firmware -
amd epyc_embedded_7302 -
amd epyc_embedded_7282_firmware -
amd epyc_embedded_7282 -
amd epyc_embedded_7272_firmware -
amd epyc_embedded_7272 -
amd epyc_embedded_7f32_firmware -
amd epyc_embedded_7f32 -
amd epyc_embedded_7262_firmware -
amd epyc_embedded_7262 -
amd epyc_embedded_7252_firmware -
amd epyc_embedded_7252 -
amd epyc_embedded_7702p_firmware -
amd epyc_embedded_7702p -
amd epyc_embedded_7502p_firmware -
amd epyc_embedded_7502p -
amd epyc_embedded_7402p_firmware -
amd epyc_embedded_7402p -
amd epyc_embedded_7302p_firmware -
amd epyc_embedded_7302p -
amd epyc_embedded_7232p_firmware -
amd epyc_embedded_7232p -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "896B4BEE-C14D-4C07-8757-32753F97B00A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC4AB744-D25D-4957-A59C-88D2DC58C80C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F05DED-9EF9-4EA3-AD5A-82A7910A707B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "450B1070-7EB3-4CA9-BAE0-A5F1BC8D496F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D334BA0B-BB66-4358-BA90-FE23517545EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05CD71FC-AB6D-47E9-9218-C91A234B9C24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE8E000-C771-4DB1-94CE-074F5B93D37D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4DC937-0674-42F7-A1D1-F7E863B53A91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D080645-4D40-4ED2-B232-924C9C54594C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "070BCADE-6B21-4A23-98EB-8066FFFAE669",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB985DC-B05A-4443-89EA-426D7E49EE64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD0DC74-61B3-41FC-989E-ED9C35DEE2F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8BA8B1-07F1-49D8-8E42-A5DDA10C65CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA09BAA0-05FB-4B9F-AAAE-043D2E0D5AD5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C806BA9-5B49-4791-8106-98AD2B6CE9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1963446-5D43-410C-9092-0AEC9B4A0057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "157807C6-68D3-4C38-92E0-8711B2E27E6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8207292-897B-4CF3-ADF1-7315BF1685DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B38FFE-9F43-4256-9ADC-B26C6AE8EAA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17975952-3089-41A0-8749-02C38C1AAAC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD5DA99-B62A-4D07-B772-23F74F7E6A9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBA5C26B-5987-4DFB-B170-28AB69FDAF4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C5EE075-60D9-4040-B92C-F9AC4CA2E45A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28ED6E82-E504-4B2F-9461-08CA7EAABDBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_755p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E7620BA-725F-4FAE-A8F8-E86B68DAB70F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E11EAA0-926A-462D-B9C9-9FDC004570DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_740p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B59724-FCCB-4FDA-93CA-8B34E05B605D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCEBE07C-D070-4F55-8068-F3C7C3D8463C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_735p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5358B3-A3A5-4DCD-A637-A7FCF9E9294D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4524C883-B83C-4725-B7B7-D2EAA5A8CA68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1295268-EEF3-4729-AB5A-92FB1A54DDCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6E2984-0D6C-4AF1-B804-318C9B0E25BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F5520E3-2CE4-4603-9B88-C87B0E8BFFC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADF2869-5A22-41B8-BA4A-983D458924AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79AEAF0-BD56-4B32-B751-8BF0B77EB35F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0499FC7A-B25F-4108-A226-7CFA88147025",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E519255-1852-4E8B-8CB0-923C84A042AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDD2A07-6611-4E66-9C50-02690CEE7CC3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "405516F0-0CFD-463C-9CD7-BD3DA8C1FAFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C467DCF-8532-48BC-A6FC-BE4630C1E591",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2899555F-1866-4C31-AC42-C53F4FA34205",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14EC642-6373-4FF3-B9F1-659DBBC9057F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4451C723-AB17-4808-981A-DA8DA9F00F4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A57A1A-5801-4B5D-8B5A-3805A3453A70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03CB40D5-9553-45EE-8E2C-AD0FE2856D74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8947D6DD-A667-4ED6-9376-599D753B6233",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEF5FCC-916A-4157-862D-F535187BB51D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A14CDA-3C70-4E7A-B443-DA80054F3772",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB6267A-94F9-4048-B7B8-A49DE90A92DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B2C9C9-A3D9-4466-B2A4-C8C7327920A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB940A6-42F3-4655-BFE9-F8781501D791",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534FC224-188B-42FB-9E77-F88C1068CD14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EA803F-13EC-4D52-8AA6-F841DC734445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CD74D15-0FCD-47DC-B98B-C17358C9C396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBCDA30-F49D-4692-A995-5F4D2B7EC9D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8623221-FED4-4F28-B179-A0F1D5E177FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "049EEAD5-8CDA-46C3-B904-4DF6304ECC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0132EA29-B3C2-40EE-9742-54803CF2076A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB4C7513-0B72-4737-9636-C796BFBAE8A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF95FF8-2E24-4F11-95A1-413D71BA28A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FDAD440-8EF5-4484-A558-EBC5B38E51A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79011066-90A2-4A2E-9267-B8F318C0F32E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869DD653-40EB-4DBC-97FA-F3FD45F91147",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEE40EA-AD62-4053-9EB8-1A79D80ABB76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E050ADA0-554E-4565-8F9E-12E7428821C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "393DAE4B-39F4-4E43-B422-0620013426BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3450FF5-4741-443B-8D63-90C6D8B798A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF23E7EB-C4BB-42F5-AE8E-6E9F6D2265A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A18E7E3-F614-4A73-A270-042D887D49DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "929C8058-491D-400F-88E9-3639269AAC41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E15528-03C0-457B-8720-7C9AC94A4413",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69EB0E55-3622-4022-A987-31D0423F0D4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "500FC809-D29D-4A8D-8DBC-943788FDE017",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4931C9D0-F5A0-4EE3-843A-A5529351DBFF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1ACE7E0-F73E-4700-A64D-A65AF8A8D585",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC73B2E-4D67-45E3-B2AE-BD50261CD128",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "693C9380-D732-4ED2-98AD-B326C6D51715",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "124C4B7F-BC05-4B65-89D4-935760AD87AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "852C88A6-5381-4D0A-B81A-D567078A6AFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)."
    },
    {
      "lang": "es",
      "value": "Un Hypervisor malicioso en conjunci\u00f3n con un proceso de atacante no privilegiado dentro de una m\u00e1quina virtual invitada SEV/SEV-ES puede producir un fallo en el vaciado de la Memoria Intermedia de Traducci\u00f3n (TLB), resultando en un comportamiento no esperado dentro de la m\u00e1quina virtual (VM)"
    }
  ],
  "id": "CVE-2021-26340",
  "lastModified": "2024-11-21T05:56:08.917",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 5.8,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-12-10T22:15:08.323",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-02-13 20:15
Modified
2025-03-20 21:15
Summary
Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.
Impacted products
Vendor Product Version
amd epyc_7773x_firmware *
amd epyc_7773x -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7663p_firmware *
amd epyc_7663p -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7643p_firmware *
amd epyc_7643p -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_7473x_firmware *
amd epyc_7473x -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7303_firmware *
amd epyc_7303 -
amd epyc_7303p_firmware *
amd epyc_7303p -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7203_firmware *
amd epyc_72f3 -
amd epyc_7203p_firmware *
amd epyc_7203p -
amd epyc_8024p_firmware *
amd epyc_8024p -
amd epyc_8024pn_firmware *
amd epyc_8024pn -
amd epyc_8124p_firmware *
amd epyc_8124p -
amd epyc_8124pn_firmware *
amd epyc_8124pn -
amd epyc_8224p_firmware *
amd epyc_8224p -
amd epyc_8224pn_firmware *
amd epyc_8224pn -
amd epyc_8324p_firmware *
amd epyc_8324p -
amd epyc_8324pn_firmware *
amd epyc_8324pn -
amd epyc_8434p_firmware *
amd epyc_8434p -
amd epyc_8434pn_firmware *
amd epyc_8434pn -
amd epyc_8534p_firmware *
amd epyc_8534p -
amd epyc_8534pn_firmware *
amd epyc_8534pn -
amd epyc_9124_firmware *
amd epyc_9124 -
amd epyc_9224_firmware *
amd epyc_9224 -
amd epyc_9254_firmware *
amd epyc_9254 -
amd epyc_9334_firmware *
amd epyc_9334 -
amd epyc_9354_firmware *
amd epyc_9354 -
amd epyc_9354p_firmware *
amd epyc_9354p -
amd epyc_9174f_firmware *
amd epyc_9174f -
amd epyc_9184x_firmware *
amd epyc_9184x -
amd epyc_9274f_firmware *
amd epyc_9274f -
amd epyc_9374f_firmware *
amd epyc_9374f -
amd epyc_9384x_firmware *
amd epyc_9384x -
amd epyc_9474f_firmware *
amd epyc_9474f -
amd epyc_9454_firmware *
amd epyc_9454 -
amd epyc_9454p_firmware *
amd epyc_9454p -
amd epyc_9534_firmware *
amd epyc_9534 -
amd epyc_9554_firmware *
amd epyc_9554 -
amd epyc_9554p_firmware *
amd epyc_9554p -
amd epyc_9634_firmware *
amd epyc_9634 -
amd epyc_9654_firmware *
amd epyc_9654 -
amd epyc_9654p_firmware *
amd epyc_9654p -
amd epyc_9684x_firmware *
amd epyc_9684x -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC71137-5861-4413-AE37-FBA5EA15CD84",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB947EC3-B3CF-4E35-86C1-DDD831D4518D",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FB9F211-8998-44FF-91FE-723BA6315B85",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3A4256B-4211-4A15-B33C-743A4898CB76",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DCADA15-DE56-4993-977D-5BE701476D46",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1063F18B-600E-46FB-B6DA-95C8D4C32ACD",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF7D4F3A-CE7A-4C84-B872-E1206912AD62",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D9E427-F642-4EA3-9213-616D4FC5BFCE",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFEA67F1-83B8-461D-8066-91BBD3FD9E24",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86A8C8F-BEFC-439B-A712-E931CC229708",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6651DED0-FD67-406B-845A-553ABBBCCB02",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "025B7A4B-0CF9-401E-AF18-3581CD04BDB5",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F64D3037-AC84-411D-AF23-2B6E49C26896",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBC1FE8-F91B-407A-B4DC-C3EE38676828",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00B84AD1-3F32-46B5-88D1-50CE43844977",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10654574-BACF-41D7-8B2D-73E2E0CBFBFB",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCC29525-306B-4E29-A846-8439487042D6",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EC6AF23-8DE0-4402-B707-F9DC3E83B906",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C45FD0CE-4B69-4C95-9EA1-575736A55045",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C2B77A7-357B-4F13-83B9-BB45EB2C1F4A",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E6EEB19-3507-439B-912F-C19D3E8D9A96",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEDA7A65-34F0-454C-9040-A7024DB82D6C",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A71852A5-4EBF-4127-B36D-53B113F3CFA3",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32A17247-5FFB-4293-805F-37A2FDE25141",
              "versionEndExcluding": "milanpi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4046AE4-F5D5-4B82-9E58-5970575E9908",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98F5728-3653-4F17-804A-B658C1195033",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "030095CD-24D9-4033-A0C5-74C55083726D",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7138757-214C-44E2-9873-9F00EAAFFBA7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4299D7-608D-4628-A8FE-DC0DBC09670F",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A25A14B0-641D-4EAE-93C8-2ED73698BA70",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E7978A2-777E-45D1-8036-7A4A72750AD8",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08631494-65FE-4052-A572-AAA959DDC4A7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4E7D4A0-5D38-4505-A272-03AAFA3C3904",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52910ADE-A9DE-477A-95DE-F8842BDF8BCC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3F61F4E-9324-4CC9-B030-33A4B1F1982C",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2552E1CD-3D25-4A86-B435-8A2A4223AE35",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1A672DC-A7F4-4115-907C-89570F552582",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45F37CB5-08DB-4E7A-80B8-789FB445E8F7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "865C7A18-D151-4DEA-9279-6EE21CA02EBC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCDF1C52-B820-4F82-9E24-F460180D06F7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD8CF52-1EF0-4718-8FE3-C83103BB2459",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F55ED1-AA9B-476E-AE54-630E8B28911A",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "608CCBAB-A934-4989-82BE-25042F0E5A57",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEA2412-28EC-4589-9B3F-78F451EF2048",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7493D0B-1DB4-436E-A297-8F931C2EFBCC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCABE02-1723-4859-B863-805A7C37014B",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECE4403-4C94-4CF0-983C-76720122738E",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B20E51-60E2-4309-A6F2-3F3F1F22B325",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
    },
    {
      "lang": "es",
      "value": "No inicializar la memoria en el firmware SEV puede permitir que un atacante privilegiado acceda a datos obsoletos de otros invitados."
    }
  ],
  "id": "CVE-2023-31346",
  "lastModified": "2025-03-20T21:15:19.280",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 4.0,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2024-02-13T20:15:52.737",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-07 19:15
Summary
Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.
Impacted products
Vendor Product Version
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7743_firmware *
amd epyc_7743 -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7773x_firmware *
amd epyc_7773x -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\n"
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n de entrada insuficiente en la SMU puede permitir que un atacante f\u00edsico extraiga el contenido de la memoria de la SMU a trav\u00e9s del bus I2C, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad."
    }
  ],
  "id": "CVE-2023-20528",
  "lastModified": "2025-04-07T19:15:47.787",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "NONE",
          "baseScore": 2.4,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "PHYSICAL",
          "availabilityImpact": "NONE",
          "baseScore": 2.4,
          "baseSeverity": "LOW",
          "confidentialityImpact": "LOW",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.9,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-01-11T08:15:13.847",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-16 18:15
Modified
2024-11-21 05:56
Summary
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.
Impacted products
Vendor Product Version
amd epyc_7601_firmware *
amd epyc_7601 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7371_firmware *
amd epyc_7371 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7261_firmware *
amd epyc_7261 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_72f3_firmware *
amd epyc_72f3 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d."
    },
    {
      "lang": "es",
      "value": "La clave privada de la plataforma persistente puede no estar protegida con un IV aleatorio, conllevando a un potencial \"two time pad attack\""
    }
  ],
  "id": "CVE-2021-26322",
  "lastModified": "2024-11-21T05:56:05.790",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-16T18:15:07.230",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-320"
        }
      ],
      "source": "psirt@amd.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-330"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Summary
A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.
Impacted products
Vendor Product Version
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification."
    },
    {
      "lang": "es",
      "value": "Un efecto secundario de una opci\u00f3n integrada en el chipset puede ser usado por un atacante para omitir las protecciones de la ROM SPI, permitiendo la modificaci\u00f3n no autorizada de la ROM SPI"
    }
  ],
  "id": "CVE-2020-12954",
  "lastModified": "2024-11-21T05:00:34.953",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-16T19:15:07.480",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-693"
        }
      ],
      "source": "psirt@amd.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2025-01-28 16:15
Summary
A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure.
Impacted products
Vendor Product Version
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7261_firmware *
amd epyc_7261 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7371_firmware *
amd epyc_7371 -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7773x_firmware *
amd epyc_7773x -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7473x_firmware *
amd epyc_7473x -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_3950xt_firmware -
amd ryzen_9_3950xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_7_3700xt_firmware -
amd ryzen_7_3700xt -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_9_5950x_firmware *
amd ryzen_9_5950x -
amd ryzen_9_5900x_firmware *
amd ryzen_9_5900x -
amd ryzen_9_5900_firmware *
amd ryzen_9_5900 -
amd ryzen_7_5800x3d_firmware *
amd ryzen_7_5800x3d -
amd ryzen_7_5800x_firmware *
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware *
amd ryzen_7_5800 -
amd ryzen_7_5700x_firmware *
amd ryzen_7_5700x -
amd ryzen_5_5600_firmware *
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware *
amd ryzen_5_5600x -
amd ryzen_5_5500_firmware *
amd ryzen_5_5500 -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E196A8EC-8E17-4394-BBB9-AAC4B773686A",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD",
              "versionEndExcluding": "naplespi_1.0.0.h",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289EC897-401C-4C91-8C1F-7CB5E034FE4D",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE",
              "versionEndExcluding": "romepi_1.0.0.d",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33C33F27-AEBC-4DD4-8262-FE025253AE97",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E39BD43-7D5D-4210-9C7F-864F683145DA",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6288EE79-3403-44A8-9235-69BA199A6030",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "051172C8-F9BA-411F-A493-7A7733C112C8",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AEA61A0-B5F7-4686-8512-EC0384D3834B",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70A5C00A-1E67-42D8-8308-2B3BB4C890F1",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8EE809F-B0F8-45BF-B09B-300B2BF19D80",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ED4A553-FAD0-4586-9028-BC31DE44ABE6",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "705F826C-F5DA-4803-9104-45B1F3E3CC86",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E0076C0-C3E2-4E85-9D48-CAA83AFA7E0B",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E14DB62-5BDB-4C06-B55E-E579BCEF1449",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C924FDA-8806-4CB7-97D4-E014E56E5463",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C48B708-BEB1-41AC-8B2E-9DA04C214CBB",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FF41C57-7BEF-4A89-8A75-6F8247885792",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3021490-D6A4-423F-B87A-9995CD6BDEA5",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "518A109A-1776-40F0-A8DF-B7C971EFB633",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F89D442C-0E87-4C0E-A2ED-194C5C42D4A5",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A11965EE-3867-4846-B714-79F1D2681AAA",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE9015F-CE32-41E7-88CD-2057AACA3D98",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CDC3E24-8F3C-4A6C-849B-52C8240EAE27",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E099CD-49DA-44B6-8DA7-C39502321D2B",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C88C305-88AA-4B54-ADA2-A13202157163",
              "versionEndExcluding": "milanpi_1.0.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72FBF8C2-C17C-4688-AF07-CBCF22A86879",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "578B531F-3884-4F0A-AE99-9F5F3D3267A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A630AE54-9E40-4ABB-81DC-35D423785C44",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E772D4F6-B0AD-490F-BAF0-DADD3C8F5295",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB03625-1A44-46CF-BEE4-B9753A2067AD",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DDE971D-6762-4D3F-B574-6839D195BB6B",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B018068-116B-4662-AB36-849F934F1AE7",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E392A7-AEC8-4F8C-8761-1247CB1A0B23",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8985C782-787C-4B7E-8C0F-033654D84764",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4012629D-3D3F-48ED-88A5-9F2CB44914F9",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD8CE65-F4DB-4D0B-8A49-6161E201F791",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65DE69E3-AE8A-42F9-897D-0950E7D074D0",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7618FD-A6A5-4DA6-93AE-253C8162F97F",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98A4202-BDB2-4ED4-97AD-9048F3B8B08E",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2021-26356",
  "lastModified": "2025-01-28T16:15:29.150",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.2,
        "impactScore": 5.2,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-09T19:15:10.737",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-367"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-367"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-05-10 19:15
Modified
2024-11-21 05:56
Summary
A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBBDB4C7-ACE7-4E2C-AEB7-43A43D6EDA02",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E2E06DC-6338-4D73-A7F4-C004CBAC7D02",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E32897E-6D86-4C74-ABB7-05844A1E7CA2",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "84179B6A-5F03-4F90-A8B5-730BBBD09CDA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs."
    },
    {
      "lang": "es",
      "value": "Un error en el TMR de SEV-ES podr\u00eda conllevar a una potencial p\u00e9rdida de integridad de la memoria para las VMs activas en SNP"
    }
  ],
  "id": "CVE-2021-26324",
  "lastModified": "2024-11-21T05:56:06.107",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-05-10T19:15:07.857",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Summary
Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP
Impacted products
Vendor Product Version
amd epyc_7601_firmware *
amd epyc_7601 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7371_firmware *
amd epyc_7371 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7261_firmware *
amd epyc_7261 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_72f3_firmware *
amd epyc_72f3 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP"
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n insuficiente de la clave de firma de AMD SEV (ASK) en el comando SEND_START en el firmware de SEV puede permitir a un atacante local autenticado llevar a cabo una denegaci\u00f3n de servicio de la PSP"
    }
  ],
  "id": "CVE-2021-26320",
  "lastModified": "2024-11-21T05:56:05.443",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-16T19:15:07.750",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "psirt@amd.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-295"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 05:00
Summary
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
Impacted products
Vendor Product Version
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_7001_firmware -
amd epyc_7001 -
amd epyc_7002_firmware -
amd epyc_7002 -
amd epyc_7232p_firmware -
amd epyc_7232p -
amd epyc_7251_firmware -
amd epyc_7251 -
amd epyc_7252_firmware -
amd epyc_7252 -
amd epyc_7261_firmware -
amd epyc_7261 -
amd epyc_7262_firmware -
amd epyc_7262 -
amd epyc_7272_firmware -
amd epyc_7272 -
amd epyc_7281_firmware -
amd epyc_7281 -
amd epyc_7282_firmware -
amd epyc_7282 -
amd epyc_7301_firmware -
amd epyc_7301 -
amd epyc_7302_firmware -
amd epyc_7302 -
amd epyc_7302p_firmware -
amd epyc_7302p -
amd epyc_7351_firmware -
amd epyc_7351 -
amd epyc_7351p_firmware -
amd epyc_7351p -
amd epyc_7352_firmware -
amd epyc_7352 -
amd epyc_7371_firmware -
amd epyc_7371 -
amd epyc_7401_firmware -
amd epyc_7401 -
amd epyc_7401p_firmware -
amd epyc_7401p -
amd epyc_7402_firmware -
amd epyc_7402 -
amd epyc_7402p_firmware -
amd epyc_7402p -
amd epyc_7451_firmware -
amd epyc_7451 -
amd epyc_7452_firmware -
amd epyc_7452 -
amd epyc_7501_firmware -
amd epyc_7501 -
amd epyc_7502_firmware -
amd epyc_7502 -
amd epyc_7502p_firmware -
amd epyc_7502p -
amd epyc_7532_firmware -
amd epyc_7532 -
amd epyc_7542_firmware -
amd epyc_7542 -
amd epyc_7551_firmware -
amd epyc_7551 -
amd epyc_7551p_firmware -
amd epyc_7551p -
amd epyc_7552_firmware -
amd epyc_7552 -
amd epyc_7601_firmware -
amd epyc_7601 -
amd epyc_7642_firmware -
amd epyc_7642 -
amd epyc_7662_firmware -
amd epyc_7662 -
amd epyc_7702_firmware -
amd epyc_7702 -
amd epyc_7702p_firmware -
amd epyc_7702p -
amd epyc_7742_firmware -
amd epyc_7742 -
amd epyc_7f32_firmware -
amd epyc_7f32 -
amd epyc_7f52_firmware -
amd epyc_7f52 -
amd epyc_7f72_firmware -
amd epyc_7f72 -
amd epyc_7h12_firmware -
amd epyc_7h12 -
amd epyc_embedded_3101_firmware -
amd epyc_embedded_3101 -
amd epyc_embedded_3151_firmware -
amd epyc_embedded_3151 -
amd epyc_embedded_3201_firmware -
amd epyc_embedded_3201 -
amd epyc_embedded_3251_firmware -
amd epyc_embedded_3251 -
amd epyc_embedded_3255_firmware -
amd epyc_embedded_3255 -
amd epyc_embedded_3351_firmware -
amd epyc_embedded_3351 -
amd epyc_embedded_3451_firmware -
amd epyc_embedded_3451 -
amd epyc_embedded_7232p_firmware -
amd epyc_embedded_7232p -
amd epyc_embedded_7251_firmware -
amd epyc_embedded_7251 -
amd epyc_embedded_7252_firmware -
amd epyc_embedded_7252 -
amd epyc_embedded_7261_firmware -
amd epyc_embedded_7261 -
amd epyc_embedded_7262_firmware -
amd epyc_embedded_7262 -
amd epyc_embedded_7272_firmware -
amd epyc_embedded_7272 -
amd epyc_embedded_7281_firmware -
amd epyc_embedded_7281 -
amd epyc_embedded_7282_firmware -
amd epyc_embedded_7282 -
amd epyc_embedded_7301_firmware -
amd epyc_embedded_7301 -
amd epyc_embedded_7302_firmware -
amd epyc_embedded_7302 -
amd epyc_embedded_7302p_firmware -
amd epyc_embedded_7302p -
amd epyc_embedded_7351_firmware -
amd epyc_embedded_7351 -
amd epyc_embedded_7352_firmware -
amd epyc_embedded_7352 -
amd epyc_embedded_735p_firmware -
amd epyc_embedded_735p -
amd epyc_embedded_7371_firmware -
amd epyc_embedded_7371 -
amd epyc_embedded_7401_firmware -
amd epyc_embedded_7401 -
amd epyc_embedded_7402_firmware -
amd epyc_embedded_7402 -
amd epyc_embedded_7402p_firmware -
amd epyc_embedded_7402p -
amd epyc_embedded_740p_firmware -
amd epyc_embedded_740p -
amd epyc_embedded_7451_firmware -
amd epyc_embedded_7451 -
amd epyc_embedded_7452_firmware -
amd epyc_embedded_7452 -
amd epyc_embedded_7501_firmware -
amd epyc_embedded_7501 -
amd epyc_embedded_7502_firmware -
amd epyc_embedded_7502 -
amd epyc_embedded_7502p_firmware -
amd epyc_embedded_7502p -
amd epyc_embedded_7532_firmware -
amd epyc_embedded_7532 -
amd epyc_embedded_7542_firmware -
amd epyc_embedded_7542 -
amd epyc_embedded_7551_firmware -
amd epyc_embedded_7551 -
amd epyc_embedded_7552_firmware -
amd epyc_embedded_7552 -
amd epyc_embedded_755p_firmware -
amd epyc_embedded_755p -
amd epyc_embedded_7601_firmware -
amd epyc_embedded_7601 -
amd epyc_embedded_7642_firmware -
amd epyc_embedded_7642 -
amd epyc_embedded_7662_firmware -
amd epyc_embedded_7662 -
amd epyc_embedded_7702_firmware -
amd epyc_embedded_7702 -
amd epyc_embedded_7702p_firmware -
amd epyc_embedded_7702p -
amd epyc_embedded_7742_firmware -
amd epyc_embedded_7742 -
amd epyc_embedded_7f32_firmware -
amd epyc_embedded_7f32 -
amd epyc_embedded_7f52_firmware -
amd epyc_embedded_7f52 -
amd epyc_embedded_7f72_firmware -
amd epyc_embedded_7f72 -
amd epyc_embedded_7h12_firmware -
amd epyc_embedded_7h12 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4510ACB-D9BA-4183-91B1-AF1367340DA7",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE5A25ED-132D-435E-BE53-9E4D551D5CCB",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4821B41-34B6-4D97-AF00-32767141140A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "684CC73A-0866-478A-891C-2908EAFED8FA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1438B05-396D-46F1-AEEE-36676DFC3ADA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F832AEC-15B6-4065-8DB9-DF9BDD7365BE",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A238766-6B98-4586-8B79-12B6E41FA13A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C86C6A31-D706-4511-A52C-AB8C836E82A9",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A054E461-03EA-4FCC-A526-CC2D46E11B4C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "964582F8-0DBA-47BF-9D0E-D9CD15FDF137",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81AB437A-2576-498D-9FB8-A5D68DC038E3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E34FFBF9-66DA-4C96-8D65-A3E754655E38",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBB6F9A9-8A82-41CF-8385-30F32AF61E5A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "076D58C5-D447-4FF1-B8C6-326B5648AE11",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF5A508-53BC-476F-BA58-C1EDC2E20DB7",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B452FCC-68D9-404C-90E0-B0978FD2E567",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B047325A-6FAF-451B-B3AF-AD3C620EFD88",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FEC88B1-F3F5-43E6-A07D-F56F1EC6DE01",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48597508-4968-415F-8601-7862CE96AF28",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C33F5E4F-38BF-4102-B8F3-0992CAB42095",
              "versionEndExcluding": "milanpi-sp3_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "896B4BEE-C14D-4C07-8757-32753F97B00A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "124C4B7F-BC05-4B65-89D4-935760AD87AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "852C88A6-5381-4D0A-B81A-D567078A6AFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBA5C26B-5987-4DFB-B170-28AB69FDAF4D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C5EE075-60D9-4040-B92C-F9AC4CA2E45A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF23E7EB-C4BB-42F5-AE8E-6E9F6D2265A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A18E7E3-F614-4A73-A270-042D887D49DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "17975952-3089-41A0-8749-02C38C1AAAC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FD5DA99-B62A-4D07-B772-23F74F7E6A9C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "393DAE4B-39F4-4E43-B422-0620013426BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3450FF5-4741-443B-8D63-90C6D8B798A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79011066-90A2-4A2E-9267-B8F318C0F32E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "869DD653-40EB-4DBC-97FA-F3FD45F91147",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8207292-897B-4CF3-ADF1-7315BF1685DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8B38FFE-9F43-4256-9ADC-B26C6AE8EAA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF95FF8-2E24-4F11-95A1-413D71BA28A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FDAD440-8EF5-4484-A558-EBC5B38E51A2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1963446-5D43-410C-9092-0AEC9B4A0057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "157807C6-68D3-4C38-92E0-8711B2E27E6B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0132EA29-B3C2-40EE-9742-54803CF2076A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB4C7513-0B72-4737-9636-C796BFBAE8A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CC73B2E-4D67-45E3-B2AE-BD50261CD128",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "693C9380-D732-4ED2-98AD-B326C6D51715",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA09BAA0-05FB-4B9F-AAAE-043D2E0D5AD5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C806BA9-5B49-4791-8106-98AD2B6CE9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CD74D15-0FCD-47DC-B98B-C17358C9C396",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBCDA30-F49D-4692-A995-5F4D2B7EC9D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCEBE07C-D070-4F55-8068-F3C7C3D8463C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_735p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D5358B3-A3A5-4DCD-A637-A7FCF9E9294D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CD0DC74-61B3-41FC-989E-ED9C35DEE2F7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED8BA8B1-07F1-49D8-8E42-A5DDA10C65CD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "070BCADE-6B21-4A23-98EB-8066FFFAE669",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB985DC-B05A-4443-89EA-426D7E49EE64",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "534FC224-188B-42FB-9E77-F88C1068CD14",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6EA803F-13EC-4D52-8AA6-F841DC734445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4931C9D0-F5A0-4EE3-843A-A5529351DBFF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1ACE7E0-F73E-4700-A64D-A65AF8A8D585",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E11EAA0-926A-462D-B9C9-9FDC004570DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_740p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51B59724-FCCB-4FDA-93CA-8B34E05B605D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E4DC937-0674-42F7-A1D1-F7E863B53A91",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D080645-4D40-4ED2-B232-924C9C54594C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47A14CDA-3C70-4E7A-B443-DA80054F3772",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EB6267A-94F9-4048-B7B8-A49DE90A92DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05CD71FC-AB6D-47E9-9218-C91A234B9C24",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AE8E000-C771-4DB1-94CE-074F5B93D37D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8947D6DD-A667-4ED6-9376-599D753B6233",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAEF5FCC-916A-4157-862D-F535187BB51D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69EB0E55-3622-4022-A987-31D0423F0D4F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "500FC809-D29D-4A8D-8DBC-943788FDE017",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A57A1A-5801-4B5D-8B5A-3805A3453A70",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03CB40D5-9553-45EE-8E2C-AD0FE2856D74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F14EC642-6373-4FF3-B9F1-659DBBC9057F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4451C723-AB17-4808-981A-DA8DA9F00F4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "450B1070-7EB3-4CA9-BAE0-A5F1BC8D496F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D334BA0B-BB66-4358-BA90-FE23517545EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C467DCF-8532-48BC-A6FC-BE4630C1E591",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2899555F-1866-4C31-AC42-C53F4FA34205",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "28ED6E82-E504-4B2F-9461-08CA7EAABDBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_755p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E7620BA-725F-4FAE-A8F8-E86B68DAB70F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FC4AB744-D25D-4957-A59C-88D2DC58C80C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52F05DED-9EF9-4EA3-AD5A-82A7910A707B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FBDD2A07-6611-4E66-9C50-02690CEE7CC3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "405516F0-0CFD-463C-9CD7-BD3DA8C1FAFF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0499FC7A-B25F-4108-A226-7CFA88147025",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E519255-1852-4E8B-8CB0-923C84A042AC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ADF2869-5A22-41B8-BA4A-983D458924AC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E79AEAF0-BD56-4B32-B751-8BF0B77EB35F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "929C8058-491D-400F-88E9-3639269AAC41",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "05E15528-03C0-457B-8720-7C9AC94A4413",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB6E2984-0D6C-4AF1-B804-318C9B0E25BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F5520E3-2CE4-4603-9B88-C87B0E8BFFC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DEE40EA-AD62-4053-9EB8-1A79D80ABB76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E050ADA0-554E-4565-8F9E-12E7428821C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8623221-FED4-4F28-B179-A0F1D5E177FA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "049EEAD5-8CDA-46C3-B904-4DF6304ECC74",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B2C9C9-A3D9-4466-B2A4-C8C7327920A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB940A6-42F3-4655-BFE9-F8781501D791",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4524C883-B83C-4725-B7B7-D2EAA5A8CA68",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1295268-EEF3-4729-AB5A-92FB1A54DDCC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor."
    },
    {
      "lang": "es",
      "value": "Los procesadores AMD EPYC\u2122 contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la virtualizaci\u00f3n cifrada segura con estado cifrado (SEV-ES) y la virtualizaci\u00f3n cifrada segura con paginaci\u00f3n anidada segura (SEV-SNP). Un atacante local autenticado podr\u00eda potencialmente explotar esta vulnerabilidad conllevando a una filtraci\u00f3n de los datos del hu\u00e9sped por parte del hipervisor malicioso"
    }
  ],
  "id": "CVE-2020-12966",
  "lastModified": "2024-11-21T05:00:36.000",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 2.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-02-04T23:15:10.333",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mailing List",
        "Third Party Advisory"
      ],
      "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-200"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-08 21:15
Summary
Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F43FE6B-1CE0-4C93-B457-385D60D0BC7E",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED4A938-7B21-4DBE-945E-04FD76712CDD",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BC64A9-A82B-4D1A-A070-541F429632FD",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2909C50-60B7-45A4-A597-B9B13A3136C6",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C5F5AAD-06AB-4AE2-ADDF-C704278B1E63",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B13FA57-6D07-4461-B40C-227977EFB67F",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D45D2D3-EACD-40A7-A2E4-3E4918C1AAFE",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9BBB5C7-942A-4B1D-9219-7D158D6B65E3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA98910-C8B0-4449-A3AD-5C2356C917A8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A92937F-8BB5-4D63-A589-58BF847F06CA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "80D9BAD4-AA85-45C6-9246-089D8C4FB30F",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB76635-870C-4304-B435-FFCD671FA882",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C0B8817-B424-4F8C-B6A0-8305C6317A65",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "661AC564-7A60-4E10-ADC3-964A04FBA896",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B7EB27B-1963-4057-9088-CBC6FBCD91F6",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B8ED95C-4703-4C83-B787-096FB2730CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2499FB92-B422-4E92-960B-FB67B4C8108F",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C1BF26-EE53-4D48-A4CB-FB04E3DE6697",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B04F08-3447-4686-A965-65F8C7C64696",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F45D168-7370-454E-AA01-66A5F418AAFA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B612010-419B-4F5C-8B00-C5BCE6B20EE3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "964257EB-311C-4323-AE2C-4BD97FB21798",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "816CE49A-4C18-4834-883B-2F19644C831D",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.\n"
    },
    {
      "lang": "es",
      "value": "La validaci\u00f3n de entrada y la verificaci\u00f3n de los l\u00edmites inadecuadas en el firmware SEV pueden perder bytes del b\u00fafer temporal, lo que puede provocar una posible divulgaci\u00f3n de informaci\u00f3n."
    }
  ],
  "id": "CVE-2021-26404",
  "lastModified": "2025-04-08T21:15:43.733",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-01-11T08:15:11.647",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Summary
Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
Impacted products
Vendor Product Version
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution."
    },
    {
      "lang": "es",
      "value": "La comprobaci\u00f3n inadecuada de entradas y rangos en la cabecera de la imagen del cargador de arranque de AMD Secure Processor (ASP) puede permitir a un atacante utilizar valores controlados por \u00e9l antes de la validaci\u00f3n de la firma, lo que podr\u00eda dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario"
    }
  ],
  "id": "CVE-2021-26335",
  "lastModified": "2024-11-21T05:56:07.863",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.2,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-16T19:15:08.260",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-09 15:15
Summary
Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F43FE6B-1CE0-4C93-B457-385D60D0BC7E",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EAFCA2B5-1192-4E6A-B348-44ECFC4C4465",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CED4A938-7B21-4DBE-945E-04FD76712CDD",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35BC64A9-A82B-4D1A-A070-541F429632FD",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2909C50-60B7-45A4-A597-B9B13A3136C6",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C5F5AAD-06AB-4AE2-ADDF-C704278B1E63",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B13FA57-6D07-4461-B40C-227977EFB67F",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D45D2D3-EACD-40A7-A2E4-3E4918C1AAFE",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9BBB5C7-942A-4B1D-9219-7D158D6B65E3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EA98910-C8B0-4449-A3AD-5C2356C917A8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A92937F-8BB5-4D63-A589-58BF847F06CA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB76635-870C-4304-B435-FFCD671FA882",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C0B8817-B424-4F8C-B6A0-8305C6317A65",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "661AC564-7A60-4E10-ADC3-964A04FBA896",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B7EB27B-1963-4057-9088-CBC6FBCD91F6",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B8ED95C-4703-4C83-B787-096FB2730CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C1BF26-EE53-4D48-A4CB-FB04E3DE6697",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2499FB92-B422-4E92-960B-FB67B4C8108F",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52B04F08-3447-4686-A965-65F8C7C64696",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F45D168-7370-454E-AA01-66A5F418AAFA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B612010-419B-4F5C-8B00-C5BCE6B20EE3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B5F85EA-6F0F-44C2-AC26-A2ABF03AEEA6",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "964257EB-311C-4323-AE2C-4BD97FB21798",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "816CE49A-4C18-4834-883B-2F19644C831D",
              "versionEndExcluding": "milanpi-sp3_1.0.0.9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\n\n"
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n insuficiente de la asignaci\u00f3n de direcciones a IO en ASP (AMD Secure Processor) puede provocar una p\u00e9rdida de integridad de la memoria en el invitado SNP."
    }
  ],
  "id": "CVE-2021-26396",
  "lastModified": "2025-04-09T15:15:43.603",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 4.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 2.5,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-01-11T08:15:11.437",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-345"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-345"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Summary
A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted.
Impacted products
Vendor Product Version
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7261_firmware *
amd epyc_7261 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7371_firmware *
amd epyc_7371 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7601_firmware *
amd epyc_7601 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7h12_firmware *
amd epyc_7h12 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted."
    },
    {
      "lang": "es",
      "value": "Existe una posible vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el chipset integrado que puede permitir a un atacante malicioso colgar el sistema cuando se reinicie"
    }
  ],
  "id": "CVE-2020-12988",
  "lastModified": "2024-11-21T05:00:37.340",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-11T22:15:11.603",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-08-10 20:15
Modified
2024-11-21 06:34
Summary
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
Impacted products
Vendor Product Version
amd athlon_3050ge_firmware -
amd athlon_3050ge -
amd athlon_3150g_firmware -
amd athlon_3150g -
amd athlon_3150ge_firmware -
amd athlon_3150ge -
amd epyc_7001_firmware -
amd epyc_7001 -
amd epyc_7002_firmware -
amd epyc_7002 -
amd epyc_7003_firmware -
amd epyc_7003 -
amd epyc_7232p_firmware -
amd epyc_7232p -
amd epyc_7251_firmware -
amd epyc_7251 -
amd epyc_7252_firmware -
amd epyc_7252 -
amd epyc_7261_firmware -
amd epyc_7261 -
amd epyc_7262_firmware -
amd epyc_7262 -
amd epyc_7272_firmware -
amd epyc_7272 -
amd epyc_7281_firmware -
amd epyc_7281 -
amd epyc_7282_firmware -
amd epyc_7282 -
amd epyc_72f3_firmware -
amd epyc_72f3 -
amd epyc_7301_firmware -
amd epyc_7301 -
amd epyc_7302_firmware -
amd epyc_7302 -
amd epyc_7302p_firmware -
amd epyc_7302p -
amd epyc_7313_firmware -
amd epyc_7313 -
amd epyc_7313p_firmware -
amd epyc_7313p -
amd epyc_7343_firmware -
amd epyc_7343 -
amd epyc_7351_firmware -
amd epyc_7351 -
amd epyc_7351p_firmware -
amd epyc_7351p -
amd epyc_7352_firmware -
amd epyc_7352 -
amd epyc_7371_firmware -
amd epyc_7371 -
amd epyc_7373x_firmware -
amd epyc_7373x -
amd epyc_73f3_firmware -
amd epyc_73f3 -
amd epyc_7401_firmware -
amd epyc_7401 -
amd epyc_7401p_firmware -
amd epyc_7401p -
amd epyc_7402_firmware -
amd epyc_7402 -
amd epyc_7402p_firmware -
amd epyc_7402p -
amd epyc_7413_firmware -
amd epyc_7413 -
amd epyc_7443_firmware -
amd epyc_7443 -
amd epyc_7443p_firmware -
amd epyc_7443p -
amd epyc_7451_firmware -
amd epyc_7451 -
amd epyc_7452_firmware -
amd epyc_7452 -
amd epyc_7453_firmware -
amd epyc_7453 -
amd epyc_7473x_firmware -
amd epyc_7473x -
amd epyc_74f3_firmware -
amd epyc_74f3 -
amd epyc_7501_firmware -
amd epyc_7501 -
amd epyc_7502_firmware -
amd epyc_7502 -
amd epyc_7502p_firmware -
amd epyc_7502p -
amd epyc_7513_firmware -
amd epyc_7513 -
amd epyc_7532_firmware -
amd epyc_7532 -
amd epyc_7542_firmware -
amd epyc_7542 -
amd epyc_7543_firmware -
amd epyc_7543 -
amd epyc_7543p_firmware -
amd epyc_7543p -
amd epyc_7551_firmware -
amd epyc_7551 -
amd epyc_7551p_firmware -
amd epyc_7551p -
amd epyc_7552_firmware -
amd epyc_7552 -
amd epyc_7573x_firmware -
amd epyc_7573x -
amd epyc_75f3_firmware -
amd epyc_75f3 -
amd epyc_7601_firmware -
amd epyc_7601 -
amd epyc_7642_firmware -
amd epyc_7642 -
amd epyc_7643_firmware -
amd epyc_7643 -
amd epyc_7662_firmware -
amd epyc_7662 -
amd epyc_7663_firmware -
amd epyc_7663 -
amd epyc_7702_firmware -
amd epyc_7702 -
amd epyc_7702p_firmware -
amd epyc_7702p -
amd epyc_7713_firmware -
amd epyc_7713 -
amd epyc_7713p_firmware -
amd epyc_7713p -
amd epyc_7742_firmware -
amd epyc_7742 -
amd epyc_7763_firmware -
amd epyc_7763 -
amd epyc_7773x_firmware -
amd epyc_7773x -
amd epyc_7f32_firmware -
amd epyc_7f32 -
amd epyc_7f52_firmware -
amd epyc_7f52 -
amd epyc_7f72_firmware -
amd epyc_7f72 -
amd epyc_7h12_firmware -
amd epyc_7h12 -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3200u_firmware -
amd ryzen_3_3200u -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_3350u_firmware -
amd ryzen_3_3350u -
amd ryzen_3_3450u_firmware -
amd ryzen_3_3450u -
amd ryzen_3_3500c_firmware -
amd ryzen_3_3500c -
amd ryzen_3_3500u_firmware -
amd ryzen_3_3500u -
amd ryzen_3_3550h_firmware -
amd ryzen_3_3550h -
amd ryzen_3_3580u_firmware -
amd ryzen_3_3580u -
amd ryzen_3_3700c_firmware -
amd ryzen_3_3700c -
amd ryzen_3_3700u_firmware -
amd ryzen_3_3700u -
amd ryzen_3_3750h_firmware -
amd ryzen_3_3750h -
amd ryzen_3_3780u_firmware -
amd ryzen_3_3780u -
amd ryzen_3_4300g_firmware -
amd ryzen_3_4300g -
amd ryzen_3_4300ge_firmware -
amd ryzen_3_4300ge -
amd ryzen_3_4300u_firmware -
amd ryzen_3_4300u -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd ryzen_3_5300g_firmware -
amd ryzen_3_5300g -
amd ryzen_3_5300ge_firmware -
amd ryzen_3_5300ge -
amd ryzen_3_5300u_firmware -
amd ryzen_3_5300u -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_2700x_firmware -
amd ryzen_5_2700x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_5_4500u_firmware -
amd ryzen_5_4500u -
amd ryzen_5_4600g_firmware -
amd ryzen_5_4600g -
amd ryzen_5_4600ge_firmware -
amd ryzen_5_4600ge -
amd ryzen_5_4600h_firmware -
amd ryzen_5_4600h -
amd ryzen_5_4600u_firmware -
amd ryzen_5_4600u -
amd ryzen_5_5500u_firmware -
amd ryzen_5_5500u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_5_5600g_firmware -
amd ryzen_5_5600g -
amd ryzen_5_5600ge_firmware -
amd ryzen_5_5600ge -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5600x_firmware -
amd ryzen_5_5600x -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_5_5700g_firmware -
amd ryzen_5_5700g -
amd ryzen_5_5700ge_firmware -
amd ryzen_5_5700ge -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_7_4700g_firmware -
amd ryzen_7_4700g -
amd ryzen_7_4700ge_firmware -
amd ryzen_7_4700ge -
amd ryzen_7_4700u_firmware -
amd ryzen_7_4700u -
amd ryzen_7_4800h_firmware -
amd ryzen_7_4800h -
amd ryzen_7_4800u_firmware -
amd ryzen_7_4800u -
amd ryzen_7_5700g_firmware -
amd ryzen_7_5700g -
amd ryzen_7_5700ge_firmware -
amd ryzen_7_5700ge -
amd ryzen_7_5700u_firmware -
amd ryzen_7_5700u -
amd ryzen_7_5700x_firmware -
amd ryzen_7_5700x -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_7_5800x_firmware -
amd ryzen_7_5800x -
amd ryzen_7_5800x3d_firmware -
amd ryzen_7_5800x3d -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_4900h_firmware -
amd ryzen_9_4900h -
amd ryzen_9_4900hs_firmware -
amd ryzen_9_4900hs -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5900x_firmware -
amd ryzen_9_5900x -
amd ryzen_9_5950x_firmware -
amd ryzen_9_5950x -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3795wx_firmware -
amd ryzen_threadripper_pro_3795wx -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3450u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62D1862B-8C77-4FBF-AA6D-EA3308311118",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7888EB-C587-44BF-95AC-05BE7776B5F8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3500c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57A170DB-7E2C-4709-B1BC-E5C367BFB8A9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B3D9C3E-F342-4932-8287-844E1963D572",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6245B6C-1BAD-4877-9921-16E32466708A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C84A1505-E6CB-431C-B44D-1E26045F30B5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3550h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "813B1750-DC92-46A5-BF2B-041DBA196968",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "695A2D6B-A46C-475F-809F-B2715A41A936",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3580u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4518EEA9-2C4D-4615-A0F5-CF40C80285E8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C2CD9B5-7469-4B8A-8653-4C71B00D0D2E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3700c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC59D0E5-A610-47D9-9820-6D5DA71C4FC7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF7FCAE2-1695-405A-AF62-9C9324BBCE09",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D27255DA-3451-492D-BC8C-F0ABD9746250",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "658FF986-FD92-487B-A7FA-43E1F96B0FEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "21782BC7-E2F5-4377-B80A-56591F3D7C25",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9397E5A5-0694-4016-AEBC-41D7902F9A03",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3780u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87C31FA9-3DED-4794-8BB9-DCAD9F9FA9A3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6D51558-9F26-43D3-8BCB-4CD9A3DD7004",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79DC351B-8B09-4BB3-B8E0-D8B3F5D83122",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information."
    },
    {
      "lang": "es",
      "value": "La contenci\u00f3n del planificador de la unidad de ejecuci\u00f3n puede conllevar a una vulnerabilidad de canal lateral encontrada en las microarquitecturas de CPU de AMD con nombre en c\u00f3digo \"Zen 1\", \"Zen 2\" y \"Zen 3\" que usan multihilo simult\u00e1neo (SMT). Al medir el nivel de contenci\u00f3n en las colas del programador, un atacante puede filtrar potencialmente informaci\u00f3n confidencial"
    }
  ],
  "id": "CVE-2021-46778",
  "lastModified": "2024-11-21T06:34:42.120",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.6,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.1,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-08-10T20:15:24.717",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-07-11 19:15
Modified
2024-11-27 16:15
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
Impacted products
Vendor Product Version
amd epyc_7251_firmware -
amd epyc_7251 -
amd epyc_7281_firmware -
amd epyc_7281 -
amd epyc_7301_firmware -
amd epyc_7301 -
amd epyc_7351_firmware -
amd epyc_7351 -
amd epyc_7351p_firmware -
amd epyc_7351p -
amd epyc_7401_firmware -
amd epyc_7401 -
amd epyc_7401p_firmware -
amd epyc_7401p -
amd epyc_7451_firmware -
amd epyc_7451 -
amd epyc_7501_firmware -
amd epyc_7501 -
amd epyc_7551_firmware -
amd epyc_7551 -
amd epyc_7551p_firmware -
amd epyc_7551p -
amd epyc_7601_firmware -
amd epyc_7601 -
amd epyc_embedded_3101_firmware -
amd epyc_embedded_3101 -
amd epyc_embedded_3151_firmware -
amd epyc_embedded_3151 -
amd epyc_embedded_3201_firmware -
amd epyc_embedded_3201 -
amd epyc_embedded_3251_firmware -
amd epyc_embedded_3251 -
amd epyc_embedded_3255_firmware -
amd epyc_embedded_3255 -
amd epyc_embedded_3451_firmware -
amd epyc_embedded_3451 -
amd epyc_7232p_firmware -
amd epyc_7232p -
amd epyc_7252_firmware -
amd epyc_7252 -
amd epyc_7262_firmware -
amd epyc_7262 -
amd epyc_7272_firmware -
amd epyc_7272 -
amd epyc_7302_firmware -
amd epyc_7302 -
amd epyc_7302p_firmware -
amd epyc_7302p -
amd epyc_7352_firmware -
amd epyc_7352 -
amd epyc_7402_firmware -
amd epyc_7402 -
amd epyc_7402p_firmware -
amd epyc_7402p -
amd epyc_7452_firmware -
amd epyc_7452 -
amd epyc_7502_firmware -
amd epyc_7502 -
amd epyc_7502p_firmware -
amd epyc_7502p -
amd epyc_7532_firmware -
amd epyc_7532 -
amd epyc_7542_firmware -
amd epyc_7542 -
amd epyc_5552_firmware -
amd epyc_5552 -
amd epyc_7642_firmware -
amd epyc_7642 -
amd epyc_7662_firmware -
amd epyc_7662 -
amd epyc_7702_firmware -
amd epyc_7702 -
amd epyc_7702p_firmware -
amd epyc_7702p -
amd epyc_7742_firmware -
amd epyc_7742 -
amd epyc_7f32_firmware -
amd epyc_7f32 -
amd epyc_7f52_firmware -
amd epyc_7f52 -
amd epyc_7f72_firmware -
amd epyc_7f72 -
amd epyc_72f3_firmware -
amd epyc_72f3 -
amd epyc_7313_firmware -
amd epyc_7313 -
amd epyc_7313p_firmware -
amd epyc_7313p -
amd epyc_7343_firmware -
amd epyc_7343 -
amd epyc_7373x_firmware -
amd epyc_7373x -
amd epyc_73f3_firmware -
amd epyc_73f3 -
amd epyc_7413_firmware -
amd epyc_7413 -
amd epyc_7443_firmware -
amd epyc_7443 -
amd epyc_7443p_firmware -
amd epyc_7443p -
amd epyc_7453_firmware -
amd epyc_7453 -
amd epyc_7473x_firmware -
amd epyc_7473x -
amd epyc_74f3_firmware -
amd epyc_74f3 -
amd epyc_7513_firmware -
amd epyc_7513 -
amd epyc_7543_firmware -
amd epyc_7543 -
amd epyc_7543p_firmware -
amd epyc_7543p -
amd epyc_7573x_firmware -
amd epyc_7573x -
amd epyc_75f3_firmware -
amd epyc_75f3 -
amd epyc_7643_firmware -
amd epyc_7643 -
amd epyc_7663_firmware -
amd epyc_7663 -
amd epyc_7713_firmware -
amd epyc_7713 -
amd epyc_7713p_firmware -
amd epyc_7713p -
amd epyc_7763_firmware -
amd epyc_7763 -
amd epyc_7773x_firmware -
amd epyc_7773x -
amd epyc_9124_firmware -
amd epyc_9124 -
amd epyc_9174f_firmware -
amd epyc_9174f -
amd epyc_9184x_firmware -
amd epyc_9184x -
amd epyc_9224_firmware -
amd epyc_9224 -
amd epyc_9254_firmware -
amd epyc_9254 -
amd epyc_9274f_firmware -
amd epyc_9274f -
amd epyc_9334_firmware -
amd epyc_9334 -
amd epyc_9354_firmware -
amd epyc_9354 -
amd epyc_9354p_firmware -
amd epyc_9354p -
amd epyc_9374f_firmware -
amd epyc_9374f -
amd epyc_9384x_firmware -
amd epyc_9384x -
amd epyc_9454_firmware -
amd epyc_9454 -
amd epyc_9454p_firmware -
amd epyc_9454p -
amd epyc_9474f_firmware -
amd epyc_9474f -
amd epyc_9534_firmware -
amd epyc_9534 -
amd epyc_9554p_firmware -
amd epyc_9554p -
amd epyc_9554_firmware -
amd epyc_9554 -
amd epyc_9634_firmware -
amd epyc_9634 -
amd epyc_9654_firmware -
amd epyc_9654 -
amd epyc_9654p_firmware -
amd epyc_9654p -
amd epyc_9684x_firmware -
amd epyc_9684x -
amd epyc_9734_firmware -
amd epyc_9734 -
amd epyc_9754_firmware -
amd epyc_9754 -
amd epyc_9754s_firmware -
amd epyc_9754s -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_5552_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BA4DD36F-5A92-4D89-9FFA-580C30A5036C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_5552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEFF9571-88E1-4BF1-B576-06AE45D58E91",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EA7278D-8165-4E5C-A9ED-F465B2A2D2E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "379AAAA6-F0BA-43AA-AFC6-CC1F4FACBEF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7889643-98F3-49E8-BD57-2DE56CC72B95",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "35151FC3-1B84-4BD5-8B99-EAFD3BAFCC9C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E61E5F12-4818-4D67-B27C-36744D5F9B71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC521A8E-84A4-4831-8433-3CA909226FE5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "947EE825-C45D-4090-9855-260AA9903E5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E06330-E43A-4A35-AE5D-FCC7E792C514",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E56DB5A-965B-4448-86C8-2E417665E4F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26DC4D67-1C38-4118-BED6-71E5727CA55A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "421268E7-3C0D-42FB-90A8-6BA8E4A29F9C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E61EB9F-8AF9-49FC-B142-B109DA826E66",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB5BC4AC-09CF-456A-8021-E931D61B09DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5F0F8E5-32F2-40C9-814A-663A19B37D1D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7ED7A173-AAB9-4EEF-957F-7940EB22F4A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D43773D-4565-4273-A719-ACEAEBD679D4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB9F36AB-0E6D-4854-A86B-3DE9AD084879",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37E9F62C-4DF2-45A6-BDC1-20AA24E85BF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F50338E3-725A-455F-9680-F700F5690057",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7D70506-EDBC-4ED9-9AD3-925610C03D7C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B1A2179-8415-460D-959B-1917AA2FCED7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8916EDB2-B9BA-4FA7-9591-DFB2E00DDC96",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "40D4BC04-155E-4A68-BFBD-9F7D81DB3B6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3A52919-B5ED-41F6-9CC6-C8468812322F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2023-20575",
  "lastModified": "2024-11-27T16:15:08.010",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 6.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-07-11T19:15:09.547",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-203"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-07 19:15
Summary
Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.
Impacted products
Vendor Product Version
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7743_firmware *
amd epyc_7743 -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7773x_firmware *
amd epyc_7773x -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\n"
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n de entrada insuficiente en la SMU puede permitir que un atacante bloquee recursos incorrectamente, lo que podr\u00eda provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-20532",
  "lastModified": "2025-04-07T19:15:48.707",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 1.4,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-01-11T08:15:14.147",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Summary
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.
Impacted products
Vendor Product Version
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations."
    },
    {
      "lang": "es",
      "value": "Una condici\u00f3n de carrera en el firmware de ASP podr\u00eda permitir que un c\u00f3digo x86 con menos privilegios realizara operaciones ASP SMM (System Management Mode)"
    }
  ],
  "id": "CVE-2020-12951",
  "lastModified": "2024-11-21T05:00:34.727",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.0,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-16T19:15:07.423",
  "references": [
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-362"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.
Impacted products
Vendor Product Version
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7261_firmware *
amd epyc_7261 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7371_firmware *
amd epyc_7371 -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7663p_firmware *
amd epyc_7663p -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7643p_firmware *
amd epyc_7643p -
amd epyc_7773x_firmware *
amd epyc_7773x -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7473x_firmware *
amd epyc_7473x -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7303p_firmware *
amd epyc_7303p -
amd epyc_7303_firmware *
amd epyc_7303 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7203p_firmware *
amd epyc_7203p -
amd epyc_7203_firmware *
amd epyc_7203 -
amd epyc_9654p_firmware *
amd epyc_9654p -
amd epyc_9654_firmware *
amd epyc_9654 -
amd epyc_9634_firmware *
amd epyc_9634 -
amd epyc_9554p_firmware *
amd epyc_9554p -
amd epyc_9554_firmware *
amd epyc_9554 -
amd epyc_9534_firmware *
amd epyc_9534 -
amd epyc_9474f_firmware *
amd epyc_9474f -
amd epyc_9454p_firmware *
amd epyc_9454p -
amd epyc_9454_firmware *
amd epyc_9454 -
amd epyc_9374f_firmware *
amd epyc_9374f -
amd epyc_9354p_firmware *
amd epyc_9354p -
amd epyc_9354_firmware *
amd epyc_9354 -
amd epyc_9334_firmware *
amd epyc_9334 -
amd epyc_9274f_firmware *
amd epyc_9274f -
amd epyc_9254_firmware *
amd epyc_9254 -
amd epyc_9224_firmware *
amd epyc_9224 -
amd epyc_9174f_firmware *
amd epyc_9174f -
amd epyc_9124_firmware *
amd epyc_9124 -
amd epyc_9684x_firmware *
amd epyc_9684x -
amd epyc_9384x_firmware *
amd epyc_9384x -
amd epyc_9184x_firmware *
amd epyc_9184x -
amd epyc_9754_firmware *
amd epyc_9754 -
amd epyc_9754s_firmware *
amd epyc_9754s -
amd epyc_9734_firmware *
amd epyc_9734 -
amd epyc_8534p_firmware *
amd epyc_8534p -
amd epyc_8534pn_firmware *
amd epyc_8534pn -
amd epyc_8434p_firmware *
amd epyc_8434p -
amd epyc_8434pn_firmware *
amd epyc_8434pn -
amd epyc_8324p_firmware *
amd epyc_8324p -
amd epyc_8324pn_firmware *
amd epyc_8324pn -
amd epyc_8224p_firmware *
amd epyc_8224p -
amd epyc_8224pn_firmware *
amd epyc_8224pn -
amd epyc_8124p_firmware *
amd epyc_8124p -
amd epyc_8124pn_firmware *
amd epyc_8124pn -
amd epyc_8024p_firmware *
amd epyc_8024p -
amd epyc_8024pn_firmware *
amd epyc_8024pn -
amd ryzen_9_3950x_firmware -
amd ryzen_9_3950x -
amd ryzen_9_3950xt_firmware -
amd ryzen_9_3950xt -
amd ryzen_9_3900_firmware -
amd ryzen_9_3900 -
amd ryzen_9_3900x_firmware -
amd ryzen_9_3900x -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_7_3700xt_firmware -
amd ryzen_7_3700xt -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3500x_firmware -
amd ryzen_5_3500x -
amd ryzen_5_3500_firmware -
amd ryzen_5_3500 -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_9_5950x_firmware *
amd ryzen_9_5950x -
amd ryzen_9_5900x_firmware *
amd ryzen_9_5900x -
amd ryzen_9_5900_firmware *
amd ryzen_9_5900 -
amd ryzen_7_5800x3d_firmware *
amd ryzen_7_5800x3d -
amd ryzen_7_5800x_firmware *
amd ryzen_7_5800x -
amd ryzen_7_5800_firmware *
amd ryzen_7_5800 -
amd ryzen_7_5700x_firmware *
amd ryzen_7_5700x -
amd ryzen_5_5600_firmware *
amd ryzen_5_5600 -
amd ryzen_5_5600x_firmware *
amd ryzen_5_5600x -
amd ryzen_5_5500_firmware *
amd ryzen_5_5500 -
amd ryzen_threadripper_3960x_firmware *
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x_firmware *
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x_firmware *
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3975wx_firmware -
amd ryzen_threadripper_pro_3975wx -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_3795wx_firmware *
amd ryzen_threadripper_pro_3795wx -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5871DB40-AF57-4031-990E-E99902CAF8FC",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1661DEF6-006B-4C14-953A-5322141B4CF0",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99C92284-DD9E-4B5D-81D7-67990905C2EE",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E90EDBC7-C8C6-4DF1-BF23-C883611DD4FC",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C459B1FE-D8ED-4483-8780-9134C3246B5E",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1855549F-70B0-4670-BF61-C0DD02525C45",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70A4946C-DF6C-4CD8-9842-E5027FFAA078",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A0DC6B5-3851-40B2-B959-524A6116A6DC",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDCBAB98-1683-47C3-8DDB-BF39F6286B34",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F606E5D6-0113-4908-900D-E94F87E6481A",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DFACA3C3-7481-45DF-9870-7761CB858B2D",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "149DCFDB-8062-4376-A7F7-645A8D40AC84",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C28F9044-4D6D-421D-8F8E-9A35DE6DA79E",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07526B36-A301-49B4-A1B4-86D182D3BFD4",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "724E131E-E678-4AD7-B521-5E68882AF4BD",
              "versionEndExcluding": "naplespi_1.0.0.k",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D30A454D-0B71-4651-AFEB-E915BCB8AC9F",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "555BC41D-3E8E-49FE-BDF3-0D496B8A9147",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99144DDA-F3EA-45E2-B470-ACD1652194F1",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C40C74D-A6F9-4428-89E4-2201DD9E9919",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "09606942-FF1B-46A1-890D-65BDA7624704",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBA9BBB-0FF7-4D15-8AD3-BF591D136B5F",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8964660C-AB5C-4932-942E-B2C6F223B097",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7C790F3-E6D1-4E00-9E48-C4FA4DB2A6B6",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "877949F7-C06F-4804-97BB-4147F348F7A0",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA520E42-E231-456B-AC4A-CBF7B42D1F4D",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D6DC9C5-2804-4320-8FA4-76A8F4665C73",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C812730D-D41C-4606-81E3-AB0A0389354D",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4E7658B-5AE0-451A-8EAA-0713FA20C2C9",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "938BE7DE-6094-4E7B-BC42-88EC0E037C8A",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42707648-1703-4FA0-8D64-2149DA2C7C49",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A30368D7-2E1D-41D5-9E72-FB2D156C1AAF",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D7C415-6952-4DCC-9EAE-50BD5DD8A226",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "956D2603-DB21-4349-BA0A-3DDD3AD8177A",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4613AA4-BE67-46B5-875C-A5D5CDEADB62",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9E7E49B-F739-4B9F-94AA-64041A3E38F8",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6FC45BE-C55D-4FB4-A10E-89A80477251C",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "40F03482-025B-4323-831B-B0F985083CD8",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E51DCE34-419F-4645-899F-A02B352BDCA9",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F683539A-0D2B-4FE8-823C-01439E74CF3C",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9E27FD9-3F54-48A2-AA2E-EE797D264757",
              "versionEndExcluding": "romepi_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A826E63-E26F-4932-9BD3-03CC801BD9E0",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCD54CF8-FE6F-4003-B9AF-D246928D4F22",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B8BC8D8-B48F-4378-8146-3B74EDE84238",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "03191635-46A1-48F5-BA2A-63A338B6ECC2",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51E7C98D-017B-4692-B3F0-1FAC416F23ED",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39854CE5-EDBC-4B85-8CEC-5403BD7CD87F",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9AC77DD-429D-481A-A113-95D26F8CC537",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9C88FCC-891E-40A2-B038-3D913EDB9ED0",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAD836DD-4A8B-43CC-8B2B-31ECD7297714",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5B8D399-2ACC-4D39-B3D0-AF8CF9F1318E",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCF3664E-44B5-4FF6-AD64-97F1CF387E88",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A941CDD6-443D-4E9A-8D6F-EF2FAF09804D",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CCE4C50-17A5-4601-B673-45A67F36580A",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3765BA20-BE1E-49FB-BDFB-4880F5AFC564",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0F89354-0DF7-41DA-AAB0-8E1C7B3CE4A6",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "912F08B6-ED19-4302-AC99-293373CF217B",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5FECF09F-6B7B-461A-9657-6327D68ACA9D",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C392C9F-A86C-485C-BF76-CF1E088041AE",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "35A303BC-4BB5-446A-9D29-0AEFF0E8EF16",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EB55FE-81B4-445D-80B3-FA75F977B741",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F7E918-47C3-4772-A048-6E8EA363D6BD",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89E1C09E-A174-4279-BA21-15571BB90A7D",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42E14FC6-B6BB-42A5-8805-AF6065557EEE",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CEDE31C-0AD0-4103-A4B1-10F898F61017",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7D2FFF-E1B8-4B46-996B-94365ECA78A9",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F03231CC-4F68-4602-9F1F-C0BA96C74AA8",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1530CEE-B546-4FE5-93A2-2AEFDCD0F1F3",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC954B29-33C0-4167-8B24-62F78C6B1AE5",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6A5F753-93BE-4568-8487-39F65F90A8E3",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "33A763A2-B6FD-4544-B051-60A43C716BEE",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "23BD0E26-B0B8-4613-8DD8-988AA6F33C36",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4276F58E-86C9-422D-A318-D3C809B53963",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A01E67D-A30F-46FA-B7ED-8ABF713694FA",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB2E339F-8B74-4FC2-BF6C-40DBB4E67AA8",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "434D661B-CC93-45AF-81DD-56D1224742DC",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3CAE0DC7-E2B7-41BF-ACE6-0C6A0D256269",
              "versionEndExcluding": "genoapi_1.0.0.8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3950xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72FBF8C2-C17C-4688-AF07-CBCF22A86879",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3950xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "578B531F-3884-4F0A-AE99-9F5F3D3267A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_3700xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A630AE54-9E40-4ABB-81DC-35D423785C44",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_3700xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E772D4F6-B0AD-490F-BAF0-DADD3C8F5295",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8EB03625-1A44-46CF-BEE4-B9753A2067AD",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DDE971D-6762-4D3F-B574-6839D195BB6B",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B018068-116B-4662-AB36-849F934F1AE7",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83E392A7-AEC8-4F8C-8761-1247CB1A0B23",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8985C782-787C-4B7E-8C0F-033654D84764",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4012629D-3D3F-48ED-88A5-9F2CB44914F9",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD8CE65-F4DB-4D0B-8A49-6161E201F791",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "65DE69E3-AE8A-42F9-897D-0950E7D074D0",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AE7618FD-A6A5-4DA6-93AE-253C8162F97F",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98A4202-BDB2-4ED4-97AD-9048F3B8B08E",
              "versionEndExcluding": "comboam4_v2_pi_1.2.0.6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817",
              "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033",
              "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F",
              "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4366EF8-3B28-4433-8265-D2760120B2FD",
              "versionEndExcluding": "chagallwspi-swrx8_1.0.0.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service."
    },
    {
      "lang": "es",
      "value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una direcci\u00f3n DRAM no v\u00e1lida, lo que podr\u00eda provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2021-46774",
  "lastModified": "2024-11-21T06:34:41.667",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.3,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-11-14T19:15:10.407",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
    },
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:34
Summary
Insufficient input validation in the SMU may allow an attacker to corrupt SMU SRAM potentially leading to a loss of integrity or denial of service.
Impacted products
Vendor Product Version
amd epyc_72f3_firmware milanpi_1.0.0.9
amd epyc_72f3 -
amd epyc_7313_firmware milanpi_1.0.0.9
amd epyc_7313 -
amd epyc_7313p_firmware milanpi_1.0.0.9
amd epyc_7313p -
amd epyc_7343_firmware milanpi_1.0.0.9
amd epyc_7343 -
amd epyc_7373x_firmware milanpi_1.0.0.9
amd epyc_7373x -
amd epyc_73f3_firmware milanpi_1.0.0.9
amd epyc_73f3 -
amd epyc_7413_firmware milanpi_1.0.0.9
amd epyc_7413 -
amd epyc_7443_firmware milanpi_1.0.0.9
amd epyc_7443 -
amd epyc_7443p_firmware milanpi_1.0.0.9
amd epyc_7443p -
amd epyc_7453_firmware milanpi_1.0.0.9
amd epyc_7453 -
amd epyc_7473x_firmware milanpi_1.0.0.9
amd epyc_7473x -
amd epyc_74f3_firmware milanpi_1.0.0.9
amd epyc_74f3 -
amd epyc_7513_firmware milanpi_1.0.0.9
amd epyc_7513 -
amd epyc_7543_firmware milanpi_1.0.0.9
amd epyc_7543 -
amd epyc_7543p_firmware milanpi_1.0.0.9
amd epyc_7543p -
amd epyc_7573x_firmware milanpi_1.0.0.9
amd epyc_7573x -
amd epyc_75f3_firmware milanpi_1.0.0.9
amd epyc_75f3 -
amd epyc_7643_firmware milanpi_1.0.0.9
amd epyc_7643 -
amd epyc_7663_firmware milanpi_1.0.0.9
amd epyc_7663 -
amd epyc_7713_firmware milanpi_1.0.0.9
amd epyc_7713 -
amd epyc_7713p_firmware milanpi_1.0.0.9
amd epyc_7713p -
amd epyc_7763_firmware milanpi_1.0.0.9
amd epyc_7763 -
amd epyc_7773x_firmware milanpi_1.0.0.9
amd epyc_7773x -
amd epyc_7232p_firmware romepi_1.0.0.e
amd epyc_7232p -
amd epyc_7252_firmware romepi_1.0.0.e
amd epyc_7252 -
amd epyc_7262_firmware romepi_1.0.0.e
amd epyc_7262 -
amd epyc_7272_firmware romepi_1.0.0.e
amd epyc_7272 -
amd epyc_7282_firmware romepi_1.0.0.e
amd epyc_7282 -
amd epyc_7302_firmware romepi_1.0.0.e
amd epyc_7302 -
amd epyc_7302p_firmware romepi_1.0.0.e
amd epyc_7302p -
amd epyc_7352_firmware romepi_1.0.0.e
amd epyc_7352 -
amd epyc_7402_firmware romepi_1.0.0.e
amd epyc_7402 -
amd epyc_7402p_firmware romepi_1.0.0.e
amd epyc_7402p -
amd epyc_7452_firmware romepi_1.0.0.e
amd epyc_7452 -
amd epyc_7502_firmware romepi_1.0.0.e
amd epyc_7502 -
amd epyc_7502p_firmware romepi_1.0.0.e
amd epyc_7502p -
amd epyc_7532_firmware romepi_1.0.0.e
amd epyc_7532 -
amd epyc_7542_firmware romepi_1.0.0.e
amd epyc_7542 -
amd epyc_7552_firmware romepi_1.0.0.e
amd epyc_7552 -
amd epyc_7642_firmware romepi_1.0.0.e
amd epyc_7642 -
amd epyc_7662_firmware romepi_1.0.0.e
amd epyc_7662 -
amd epyc_7702_firmware romepi_1.0.0.e
amd epyc_7702 -
amd epyc_7702p_firmware romepi_1.0.0.e
amd epyc_7702p -
amd epyc_7742_firmware romepi_1.0.0.e
amd epyc_7742 -
amd epyc_7f32_firmware romepi_1.0.0.e
amd epyc_7f32 -
amd epyc_7f52_firmware romepi_1.0.0.e
amd epyc_7f52 -
amd epyc_7f72_firmware romepi_1.0.0.e
amd epyc_7f72 -
amd epyc_7h12_firmware romepi_1.0.0.e
amd epyc_7h12 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service."
    }
  ],
  "id": "CVE-2021-46762",
  "lastModified": "2024-11-21T06:34:39.943",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "LOW",
          "baseScore": 3.9,
          "baseSeverity": "LOW",
          "confidentialityImpact": "NONE",
          "integrityImpact": "LOW",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 2.7,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.1,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.2,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-09T19:15:11.080",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    },
    {
      "source": "psirt@amd.com",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2025-01-28 16:15
Summary
Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to execute arbitrary DMA copies, which can lead to code execution.
Impacted products
Vendor Product Version
amd epyc_72f3_firmware milanpi_1.0.0.9
amd epyc_72f3 -
amd epyc_7313_firmware milanpi_1.0.0.9
amd epyc_7313 -
amd epyc_7313p_firmware milanpi_1.0.0.9
amd epyc_7313p -
amd epyc_7343_firmware milanpi_1.0.0.9
amd epyc_7343 -
amd epyc_7373x_firmware milanpi_1.0.0.9
amd epyc_7373x -
amd epyc_73f3_firmware milanpi_1.0.0.9
amd epyc_73f3 -
amd epyc_7413_firmware milanpi_1.0.0.9
amd epyc_7413 -
amd epyc_7443_firmware milanpi_1.0.0.9
amd epyc_7443 -
amd epyc_7443p_firmware milanpi_1.0.0.9
amd epyc_7443p -
amd epyc_7453_firmware milanpi_1.0.0.9
amd epyc_7453 -
amd epyc_7473x_firmware milanpi_1.0.0.9
amd epyc_7473x -
amd epyc_74f3_firmware milanpi_1.0.0.9
amd epyc_74f3 -
amd epyc_7513_firmware milanpi_1.0.0.9
amd epyc_7513 -
amd epyc_7543_firmware milanpi_1.0.0.9
amd epyc_7543 -
amd epyc_7543p_firmware milanpi_1.0.0.9
amd epyc_7543p -
amd epyc_7573x_firmware milanpi_1.0.0.9
amd epyc_7573x -
amd epyc_75f3_firmware milanpi_1.0.0.9
amd epyc_75f3 -
amd epyc_7643_firmware milanpi_1.0.0.9
amd epyc_7643 -
amd epyc_7663_firmware milanpi_1.0.0.9
amd epyc_7663 -
amd epyc_7713_firmware milanpi_1.0.0.9
amd epyc_7713 -
amd epyc_7713p_firmware milanpi_1.0.0.9
amd epyc_7713p -
amd epyc_7763_firmware milanpi_1.0.0.9
amd epyc_7763 -
amd epyc_7773x_firmware milanpi_1.0.0.9
amd epyc_7773x -
amd epyc_7232p_firmware romepi_1.0.0.e
amd epyc_7232p -
amd epyc_7252_firmware romepi_1.0.0.e
amd epyc_7252 -
amd epyc_7262_firmware romepi_1.0.0.e
amd epyc_7262 -
amd epyc_7272_firmware romepi_1.0.0.e
amd epyc_7272 -
amd epyc_7282_firmware romepi_1.0.0.e
amd epyc_7282 -
amd epyc_7302_firmware romepi_1.0.0.e
amd epyc_7302 -
amd epyc_7302p_firmware romepi_1.0.0.e
amd epyc_7302p -
amd epyc_7352_firmware romepi_1.0.0.e
amd epyc_7352 -
amd epyc_7402_firmware romepi_1.0.0.e
amd epyc_7402 -
amd epyc_7402p_firmware romepi_1.0.0.e
amd epyc_7402p -
amd epyc_7452_firmware romepi_1.0.0.e
amd epyc_7452 -
amd epyc_7502_firmware romepi_1.0.0.e
amd epyc_7502 -
amd epyc_7502p_firmware romepi_1.0.0.e
amd epyc_7502p -
amd epyc_7532_firmware romepi_1.0.0.e
amd epyc_7532 -
amd epyc_7542_firmware romepi_1.0.0.e
amd epyc_7542 -
amd epyc_7552_firmware romepi_1.0.0.e
amd epyc_7552 -
amd epyc_7642_firmware romepi_1.0.0.e
amd epyc_7642 -
amd epyc_7662_firmware romepi_1.0.0.e
amd epyc_7662 -
amd epyc_7702_firmware romepi_1.0.0.e
amd epyc_7702 -
amd epyc_7702p_firmware romepi_1.0.0.e
amd epyc_7702p -
amd epyc_7742_firmware romepi_1.0.0.e
amd epyc_7742 -
amd epyc_7f32_firmware romepi_1.0.0.e
amd epyc_7f32 -
amd epyc_7f52_firmware romepi_1.0.0.e
amd epyc_7f52 -
amd epyc_7f72_firmware romepi_1.0.0.e
amd epyc_7f72 -
amd epyc_7h12_firmware romepi_1.0.0.e
amd epyc_7h12 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*",
              "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n"
    }
  ],
  "id": "CVE-2021-46769",
  "lastModified": "2025-01-28T16:15:32.440",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-05-09T19:15:11.200",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-07 19:15
Summary
Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.
Impacted products
Vendor Product Version
amd epyc_7h12_firmware *
amd epyc_7h12 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7743_firmware *
amd epyc_7743 -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7773x_firmware *
amd epyc_7773x -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D",
              "versionEndExcluding": "romepi_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B",
              "versionEndExcluding": "milanpi_1.0.0.5",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\n"
    },
    {
      "lang": "es",
      "value": "Las comprobaciones limitadas insuficientes en la SMU pueden permitir que un atacante actualice el espacio de direcciones desde/hasta a un valor no v\u00e1lido, lo que podr\u00eda provocar una denegaci\u00f3n de servicio."
    }
  ],
  "id": "CVE-2023-20529",
  "lastModified": "2025-04-07T19:15:48.010",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
        "type": "Secondary"
      }
    ]
  },
  "published": "2023-01-11T08:15:13.897",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
      "type": "Secondary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:29
Summary
IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.
Impacted products
Vendor Product Version
amd epyc_8024pn_firmware *
amd epyc_8024pn -
amd epyc_8024p_firmware *
amd epyc_8024p -
amd epyc_8124pn_firmware *
amd epyc_8124pn -
amd epyc_8124p_firmware *
amd epyc_8124p -
amd epyc_8224pn_firmware *
amd epyc_8224pn -
amd epyc_8224p_firmware *
amd epyc_8224p -
amd epyc_8324pn_firmware *
amd epyc_8324pn -
amd epyc_8324p_firmware *
amd epyc_8324p -
amd epyc_8434pn_firmware *
amd epyc_8434pn -
amd epyc_8434p_firmware *
amd epyc_8434p -
amd epyc_8534pn_firmware *
amd epyc_8534pn -
amd epyc_8534p_firmware *
amd epyc_8534p -
amd epyc_9734_firmware *
amd epyc_9734 -
amd epyc_9754s_firmware *
amd epyc_9754s -
amd epyc_9754_firmware *
amd epyc_9754 -
amd epyc_9184x_firmware *
amd epyc_9184x -
amd epyc_9384x_firmware *
amd epyc_9384x -
amd epyc_9684x_firmware *
amd epyc_9684x -
amd epyc_9124_firmware *
amd epyc_9124 -
amd epyc_9174f_firmware *
amd epyc_9174f -
amd epyc_9224_firmware *
amd epyc_9224 -
amd epyc_9254_firmware *
amd epyc_9254 -
amd epyc_9274f_firmware *
amd epyc_9274f -
amd epyc_9334_firmware *
amd epyc_9334 -
amd epyc_9354_firmware *
amd epyc_9354 -
amd epyc_9354p_firmware *
amd epyc_9354p -
amd epyc_9374f_firmware *
amd epyc_9374f -
amd epyc_9454_firmware *
amd epyc_9454 -
amd epyc_9454p_firmware *
amd epyc_9454p -
amd epyc_9474f_firmware *
amd epyc_9474f -
amd epyc_9534_firmware *
amd epyc_9534 -
amd epyc_9554_firmware *
amd epyc_9554 -
amd epyc_9554p_firmware *
amd epyc_9554p -
amd epyc_9634_firmware *
amd epyc_9634 -
amd epyc_9654_firmware *
amd epyc_9654 -
amd epyc_9654p_firmware *
amd epyc_9654p -
amd epyc_7203_firmware *
amd epyc_7203 -
amd epyc_7203p_firmware *
amd epyc_7203p -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7303_firmware *
amd epyc_7303 -
amd epyc_7303p_firmware *
amd epyc_7303p -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7373x_firmware *
amd epyc_7373x -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_7473x_firmware *
amd epyc_7473x -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7573x_firmware *
amd epyc_7573x -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7773x_firmware *
amd epyc_7773x -
amd epyc_7643p_firmware *
amd epyc_7643p -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7663p_firmware *
amd epyc_7663p -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7763_firmware *
amd epyc_7763 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C98F5728-3653-4F17-804A-B658C1195033",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4046AE4-F5D5-4B82-9E58-5970575E9908",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "030095CD-24D9-4033-A0C5-74C55083726D",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF4299D7-608D-4628-A8FE-DC0DBC09670F",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7138757-214C-44E2-9873-9F00EAAFFBA7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E7978A2-777E-45D1-8036-7A4A72750AD8",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A25A14B0-641D-4EAE-93C8-2ED73698BA70",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08631494-65FE-4052-A572-AAA959DDC4A7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "52910ADE-A9DE-477A-95DE-F8842BDF8BCC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4E7D4A0-5D38-4505-A272-03AAFA3C3904",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "51A9A1EA-F6E1-496D-B406-24602D845392",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFA9B863-5296-44E8-90FE-F07115B32D4A",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CAD221F-4A56-439B-A25C-E280792ACA60",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCDF1C52-B820-4F82-9E24-F460180D06F7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B20E51-60E2-4309-A6F2-3F3F1F22B325",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3F61F4E-9324-4CC9-B030-33A4B1F1982C",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "865C7A18-D151-4DEA-9279-6EE21CA02EBC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2552E1CD-3D25-4A86-B435-8A2A4223AE35",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1A672DC-A7F4-4115-907C-89570F552582",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45F37CB5-08DB-4E7A-80B8-789FB445E8F7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13F55ED1-AA9B-476E-AE54-630E8B28911A",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDD8CF52-1EF0-4718-8FE3-C83103BB2459",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "608CCBAB-A934-4989-82BE-25042F0E5A57",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAEA2412-28EC-4589-9B3F-78F451EF2048",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7493D0B-1DB4-436E-A297-8F931C2EFBCC",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BDCABE02-1723-4859-B863-805A7C37014B",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CECE4403-4C94-4CF0-983C-76720122738E",
              "versionEndExcluding": "genoapi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5",
              "versionEndExcluding": "milanpi_1.0.0.b",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity."
    },
    {
      "lang": "es",
      "value": "IOMMU maneja incorrectamente ciertos rangos de direcciones especiales con entradas de tabla de dispositivos (DTE) no v\u00e1lidas, lo que puede permitir que un atacante con privilegios y un hipervisor comprometido induzca fallas de DTE para eludir las comprobaciones de RMP en SEV-SNP, lo que podr\u00eda provocar una p\u00e9rdida de integridad del hu\u00e9sped."
    }
  ],
  "id": "CVE-2023-20584",
  "lastModified": "2024-12-12T20:29:14.730",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "HIGH",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 5.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 4.0,
        "source": "psirt@amd.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "NONE",
          "baseScore": 6.0,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 4.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2024-08-13T17:15:19.713",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Analyzed",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Summary
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
Impacted products
Vendor Product Version
amd epyc_7003_firmware *
amd epyc_7003 -
amd epyc_7002_firmware *
amd epyc_7002 -
amd epyc_7001_firmware *
amd epyc_7001 -
amd epyc_72f3_firmware *
amd epyc_72f3 -
amd epyc_7313_firmware *
amd epyc_7313 -
amd epyc_7313p_firmware *
amd epyc_7313p -
amd epyc_7343_firmware *
amd epyc_7343 -
amd epyc_73f3_firmware *
amd epyc_73f3 -
amd epyc_7413_firmware *
amd epyc_7413 -
amd epyc_7443_firmware *
amd epyc_7443 -
amd epyc_7443p_firmware *
amd epyc_7443p -
amd epyc_7453_firmware *
amd epyc_7453 -
amd epyc_74f3_firmware *
amd epyc_74f3 -
amd epyc_7513_firmware *
amd epyc_7513 -
amd epyc_7543_firmware *
amd epyc_7543 -
amd epyc_7543p_firmware *
amd epyc_7543p -
amd epyc_75f3_firmware *
amd epyc_75f3 -
amd epyc_7643_firmware *
amd epyc_7643 -
amd epyc_7663_firmware *
amd epyc_7663 -
amd epyc_7713_firmware *
amd epyc_7713 -
amd epyc_7713p_firmware *
amd epyc_7713p -
amd epyc_7763_firmware *
amd epyc_7763 -
amd epyc_7232p_firmware *
amd epyc_7232p -
amd epyc_7252_firmware *
amd epyc_7252 -
amd epyc_7262_firmware *
amd epyc_7262 -
amd epyc_7272_firmware *
amd epyc_7272 -
amd epyc_7282_firmware *
amd epyc_7282 -
amd epyc_7302_firmware *
amd epyc_7302 -
amd epyc_7302p_firmware *
amd epyc_7302p -
amd epyc_7352_firmware *
amd epyc_7352 -
amd epyc_7402_firmware *
amd epyc_7402 -
amd epyc_7402p_firmware *
amd epyc_7402p -
amd epyc_7452_firmware *
amd epyc_7452 -
amd epyc_7502_firmware *
amd epyc_7502 -
amd epyc_7502p_firmware *
amd epyc_7502p -
amd epyc_7532_firmware *
amd epyc_7532 -
amd epyc_7542_firmware *
amd epyc_7542 -
amd epyc_7552_firmware *
amd epyc_7552 -
amd epyc_7642_firmware *
amd epyc_7642 -
amd epyc_7662_firmware *
amd epyc_7662 -
amd epyc_7702_firmware *
amd epyc_7702 -
amd epyc_7702p_firmware *
amd epyc_7702p -
amd epyc_7742_firmware *
amd epyc_7742 -
amd epyc_7f32_firmware *
amd epyc_7f32 -
amd epyc_7f52_firmware *
amd epyc_7f52 -
amd epyc_7f72_firmware *
amd epyc_7f72 -
amd epyc_7251_firmware *
amd epyc_7251 -
amd epyc_7281_firmware *
amd epyc_7281 -
amd epyc_7301_firmware *
amd epyc_7301 -
amd epyc_7351_firmware *
amd epyc_7351 -
amd epyc_7351p_firmware *
amd epyc_7351p -
amd epyc_7401_firmware *
amd epyc_7401 -
amd epyc_7401p_firmware *
amd epyc_7401p -
amd epyc_7451_firmware *
amd epyc_7451 -
amd epyc_7501_firmware *
amd epyc_7501 -
amd epyc_7551_firmware *
amd epyc_7551 -
amd epyc_7551p_firmware *
amd epyc_7551p -
amd epyc_7601_firmware *
amd epyc_7601 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5",
              "versionEndExcluding": "milanpi-sp3_1.0.0.4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17",
              "versionEndExcluding": "romepi-sp3_1.0.0.c",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33",
              "versionEndExcluding": "naplespi-sp3_1.0.0.g",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources."
    },
    {
      "lang": "es",
      "value": "AMD System Management Unit (SMU) puede experimentar un desbordamiento en la regi\u00f3n heap de la memoria que puede resultar en una p\u00e9rdida de recursos"
    }
  ],
  "id": "CVE-2021-26330",
  "lastModified": "2024-11-21T05:56:07.057",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-16T19:15:08.083",
  "references": [
    {
      "source": "psirt@amd.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021"
    }
  ],
  "sourceIdentifier": "psirt@amd.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-122"
        }
      ],
      "source": "psirt@amd.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 06:49
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
Impacted products
Vendor Product Version
xen xen -
amd a10-9600p -
amd a10-9630p -
amd a12-9700p -
amd a12-9730p -
amd a4-9120 -
amd a6-9210 -
amd a6-9220 -
amd a6-9220c -
amd a9-9410 -
amd a9-9420 -
amd athlon_gold_3150u -
amd athlon_silver_3050u -
amd athlon_x4_750 -
amd athlon_x4_760k -
amd athlon_x4_830 -
amd athlon_x4_835 -
amd athlon_x4_840 -
amd athlon_x4_845 -
amd athlon_x4_860k -
amd athlon_x4_870k -
amd athlon_x4_880k -
amd athlon_x4_940 -
amd athlon_x4_950 -
amd athlon_x4_970 -
amd epyc_7001 -
amd epyc_7002 -
amd epyc_7003 -
amd epyc_7251 -
amd epyc_7252 -
amd epyc_7261 -
amd epyc_7262 -
amd epyc_7272 -
amd epyc_7281 -
amd epyc_7282 -
amd epyc_72f3 -
amd epyc_7301 -
amd epyc_7302 -
amd epyc_7302p -
amd epyc_7313 -
amd epyc_7313p -
amd epyc_7343 -
amd epyc_7351 -
amd epyc_7351p -
amd epyc_7352 -
amd epyc_7371 -
amd epyc_7373x -
amd epyc_7401 -
amd epyc_7401p -
amd epyc_7402 -
amd epyc_7402p -
amd epyc_7413 -
amd epyc_7443 -
amd epyc_7443p -
amd epyc_7451 -
amd epyc_7452 -
amd epyc_7473x -
amd epyc_74f3 -
amd epyc_7501 -
amd epyc_7502 -
amd epyc_7502p -
amd epyc_7513 -
amd epyc_7532 -
amd epyc_7542 -
amd epyc_7543 -
amd epyc_7543p -
amd epyc_7551 -
amd epyc_7551p -
amd epyc_7552 -
amd epyc_7573x -
amd epyc_75f3 -
amd epyc_7601 -
amd epyc_7642 -
amd epyc_7643 -
amd epyc_7662 -
amd epyc_7663 -
amd epyc_7702 -
amd epyc_7713 -
amd epyc_7713p -
amd epyc_7742 -
amd epyc_7763 -
amd epyc_7773x -
amd epyc_7f32 -
amd epyc_7f52 -
amd epyc_7f72 -
amd epyc_7h12 -
amd ryzen_3_2200u -
amd ryzen_3_2300u -
amd ryzen_3_3100 -
amd ryzen_3_3200u -
amd ryzen_3_3250u -
amd ryzen_3_3300g -
amd ryzen_3_3300u -
amd ryzen_3_3300x -
amd ryzen_3_4300g -
amd ryzen_3_4300ge -
amd ryzen_3_4300u -
amd ryzen_3_5125c -
amd ryzen_3_5400u -
amd ryzen_3_5425c -
amd ryzen_3_5425u -
amd ryzen_5_2500u -
amd ryzen_5_2600 -
amd ryzen_5_2600h -
amd ryzen_5_2600x -
amd ryzen_5_2700 -
amd ryzen_5_2700x -
amd ryzen_5_3400g -
amd ryzen_5_3450g -
amd ryzen_5_3500u -
amd ryzen_5_3550h -
amd ryzen_5_3580u -
amd ryzen_5_3600 -
amd ryzen_5_3600x -
amd ryzen_5_3600xt -
amd ryzen_5_4500u -
amd ryzen_5_4600g -
amd ryzen_5_4600ge -
amd ryzen_5_4600h -
amd ryzen_5_4600u -
amd ryzen_5_5560u -
amd ryzen_5_5600h -
amd ryzen_5_5600hs -
amd ryzen_5_5600u -
amd ryzen_5_5625c -
amd ryzen_5_5625u -
amd ryzen_7_2700 -
amd ryzen_7_2700u -
amd ryzen_7_2700x -
amd ryzen_7_2800h -
amd ryzen_7_3700u -
amd ryzen_7_3700x -
amd ryzen_7_3750h -
amd ryzen_7_3780u -
amd ryzen_7_3800x -
amd ryzen_7_3800xt -
amd ryzen_7_4700g -
amd ryzen_7_4700ge -
amd ryzen_7_4700u -
amd ryzen_7_4800h -
amd ryzen_7_4800u -
amd ryzen_7_5800h -
amd ryzen_7_5800hs -
amd ryzen_7_5800u -
amd ryzen_7_5825c -
amd ryzen_7_5825u -
amd ryzen_7_pro_3700u -
amd ryzen_9_4900h -
amd ryzen_9_5900hs -
amd ryzen_9_5900hx -
amd ryzen_9_5980hs -
amd ryzen_9_5980hx -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_3960x -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_pro_3795wx -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx -
amd athlon_x4_750_firmware -
amd athlon_x4_750 -
amd athlon_x4_760k_firmware -
amd athlon_x4_760k -
amd athlon_x4_830_firmware -
amd athlon_x4_830 -
amd athlon_x4_835_firmware -
amd athlon_x4_835 -
amd athlon_x4_840_firmware -
amd athlon_x4_840 -
amd athlon_x4_845_firmware -
amd athlon_x4_845 -
amd athlon_x4_860k_firmware -
amd athlon_x4_860k -
amd athlon_x4_870k_firmware -
amd athlon_x4_870k -
amd athlon_x4_880k_firmware -
amd athlon_x4_880k -
amd athlon_x4_940_firmware -
amd athlon_x4_940 -
amd athlon_x4_950_firmware -
amd athlon_x4_950 -
amd athlon_x4_970_firmware -
amd athlon_x4_970 -
amd ryzen_threadripper_pro_3995wx_firmware -
amd ryzen_threadripper_pro_3995wx -
amd ryzen_threadripper_pro_3795wx_firmware -
amd ryzen_threadripper_pro_3795wx -
amd ryzen_threadripper_pro_3955wx_firmware -
amd ryzen_threadripper_pro_3955wx -
amd ryzen_threadripper_pro_3945wx_firmware -
amd ryzen_threadripper_pro_3945wx -
amd ryzen_threadripper_pro_5955wx_firmware -
amd ryzen_threadripper_pro_5955wx -
amd ryzen_threadripper_pro_5965wx_firmware -
amd ryzen_threadripper_pro_5965wx -
amd ryzen_threadripper_pro_5945wx_firmware -
amd ryzen_threadripper_pro_5945wx -
amd ryzen_threadripper_pro_5975wx_firmware -
amd ryzen_threadripper_pro_5975wx -
amd ryzen_threadripper_pro_5995wx_firmware -
amd ryzen_threadripper_pro_5995wx -
amd ryzen_threadripper_2990wx_firmware -
amd ryzen_threadripper_2990wx -
amd ryzen_threadripper_2970wx_firmware -
amd ryzen_threadripper_2970wx -
amd ryzen_threadripper_2950x_firmware -
amd ryzen_threadripper_2950x -
amd ryzen_threadripper_2920x_firmware -
amd ryzen_threadripper_2920x -
amd ryzen_threadripper_3990x_firmware -
amd ryzen_threadripper_3990x -
amd ryzen_threadripper_3970x_firmware -
amd ryzen_threadripper_3970x -
amd ryzen_threadripper_3960x_firmware -
amd ryzen_threadripper_3960x -
amd a12-9700p_firmware -
amd a12-9700p -
amd a12-9730p_firmware -
amd a12-9730p -
amd a10-9600p_firmware -
amd a10-9600p -
amd a10-9630p_firmware -
amd a10-9630p -
amd a9-9410_firmware -
amd a9-9410 -
amd a9-9420_firmware -
amd a9-9420 -
amd a6-9210_firmware -
amd a6-9210 -
amd a6-9220_firmware -
amd a6-9220 -
amd a6-9220c_firmware -
amd a6-9220c -
amd a4-9120_firmware -
amd a4-9120 -
amd ryzen_3_2200u_firmware -
amd ryzen_3_2200u -
amd ryzen_3_2300u_firmware -
amd ryzen_3_2300u -
amd ryzen_5_2500u_firmware -
amd ryzen_5_2500u -
amd ryzen_5_2600_firmware -
amd ryzen_5_2600 -
amd ryzen_5_2600h_firmware -
amd ryzen_5_2600h -
amd ryzen_5_2600x_firmware -
amd ryzen_5_2600x -
amd ryzen_5_2700_firmware -
amd ryzen_5_2700 -
amd ryzen_5_2700x_firmware -
amd ryzen_5_2700x -
amd ryzen_7_2700_firmware -
amd ryzen_7_2700 -
amd ryzen_7_2700u_firmware -
amd ryzen_7_2700u -
amd ryzen_7_2700x_firmware -
amd ryzen_7_2700x -
amd ryzen_7_2800h_firmware -
amd ryzen_7_2800h -
amd ryzen_3_3100_firmware -
amd ryzen_3_3100 -
amd ryzen_3_3200u_firmware -
amd ryzen_3_3200u -
amd ryzen_3_3250u_firmware -
amd ryzen_3_3250u -
amd ryzen_3_3300g_firmware -
amd ryzen_3_3300g -
amd ryzen_3_3300u_firmware -
amd ryzen_3_3300u -
amd ryzen_3_3300x_firmware -
amd ryzen_3_3300x -
amd ryzen_5_3400g_firmware -
amd ryzen_5_3400g -
amd ryzen_5_3450g_firmware -
amd ryzen_5_3450g -
amd ryzen_5_3500u_firmware -
amd ryzen_5_3500u -
amd ryzen_5_3550h_firmware -
amd ryzen_5_3550h -
amd ryzen_5_3600_firmware -
amd ryzen_5_3600 -
amd ryzen_5_3600x_firmware -
amd ryzen_5_3600x -
amd ryzen_5_3600xt_firmware -
amd ryzen_5_3600xt -
amd ryzen_7_3700u_firmware -
amd ryzen_7_3700u -
amd ryzen_7_3700x_firmware -
amd ryzen_7_3700x -
amd ryzen_7_3750h_firmware -
amd ryzen_7_3750h -
amd ryzen_7_3800x_firmware -
amd ryzen_7_3800x -
amd ryzen_7_3800xt_firmware -
amd ryzen_7_3800xt -
amd ryzen_5_3580u_firmware -
amd ryzen_5_3580u -
amd ryzen_7_pro_3700u_firmware -
amd ryzen_7_pro_3700u -
amd ryzen_7_3780u_firmware -
amd ryzen_7_3780u -
amd ryzen_7_4700g_firmware -
amd ryzen_7_4700g -
amd ryzen_7_4700ge_firmware -
amd ryzen_7_4700ge -
amd ryzen_5_4600g_firmware -
amd ryzen_5_4600g -
amd ryzen_5_4600ge_firmware -
amd ryzen_5_4600ge -
amd ryzen_3_4300g_firmware -
amd ryzen_3_4300g -
amd ryzen_3_4300ge_firmware -
amd ryzen_3_4300ge -
amd ryzen_9_4900h_firmware -
amd ryzen_9_4900h -
amd ryzen_7_4800u_firmware -
amd ryzen_7_4800u -
amd ryzen_7_4700u_firmware -
amd ryzen_7_4700u -
amd ryzen_7_4800h_firmware -
amd ryzen_7_4800h -
amd ryzen_5_4600u_firmware -
amd ryzen_5_4600u -
amd ryzen_5_4500u_firmware -
amd ryzen_5_4500u -
amd ryzen_5_4600h_firmware -
amd ryzen_5_4600h -
amd ryzen_3_4300u_firmware -
amd ryzen_3_4300u -
amd ryzen_9_5980hx_firmware -
amd ryzen_9_5980hx -
amd ryzen_9_5980hs_firmware -
amd ryzen_9_5980hs -
amd ryzen_7_5825u_firmware -
amd ryzen_7_5825u -
amd ryzen_9_5900hx_firmware -
amd ryzen_9_5900hx -
amd ryzen_9_5900hs_firmware -
amd ryzen_9_5900hs -
amd ryzen_7_5825c_firmware -
amd ryzen_7_5825c -
amd ryzen_7_5800h_firmware -
amd ryzen_7_5800h -
amd ryzen_5_5625u_firmware -
amd ryzen_5_5625u -
amd ryzen_7_5800hs_firmware -
amd ryzen_7_5800hs -
amd ryzen_5_5625c_firmware -
amd ryzen_5_5625c -
amd ryzen_5_5600h_firmware -
amd ryzen_5_5600h -
amd ryzen_5_5600hs_firmware -
amd ryzen_5_5600hs -
amd ryzen_7_5800u_firmware -
amd ryzen_7_5800u -
amd ryzen_5_5600u_firmware -
amd ryzen_5_5600u -
amd ryzen_5_5560u_firmware -
amd ryzen_5_5560u -
amd ryzen_3_5425u_firmware -
amd ryzen_3_5425u -
amd ryzen_3_5425c_firmware -
amd ryzen_3_5425c -
amd ryzen_3_5400u_firmware -
amd ryzen_3_5400u -
amd ryzen_3_5125c_firmware -
amd ryzen_3_5125c -
amd athlon_gold_3150u_firmware -
amd athlon_gold_3150u -
amd athlon_silver_3050u_firmware -
amd athlon_silver_3050u -
amd epyc_7001_firmware -
amd epyc_7001 -
amd epyc_7251_firmware -
amd epyc_7251 -
amd epyc_7261_firmware -
amd epyc_7261 -
amd epyc_7281_firmware -
amd epyc_7281 -
amd epyc_7301_firmware -
amd epyc_7301 -
amd epyc_7351_firmware -
amd epyc_7351 -
amd epyc_7351p_firmware -
amd epyc_7351p -
amd epyc_7371_firmware -
amd epyc_7371 -
amd epyc_7401_firmware -
amd epyc_7401 -
amd epyc_7401p_firmware -
amd epyc_7401p -
amd epyc_7451_firmware -
amd epyc_7451 -
amd epyc_7501_firmware -
amd epyc_7501 -
amd epyc_7551_firmware -
amd epyc_7551 -
amd epyc_7551p_firmware -
amd epyc_7551p -
amd epyc_7601_firmware -
amd epyc_7601 -
amd epyc_7002_firmware -
amd epyc_7002 -
amd epyc_7252_firmware -
amd epyc_7252 -
amd epyc_7262_firmware -
amd epyc_7262 -
amd epyc_7272_firmware -
amd epyc_7272 -
amd epyc_7282_firmware -
amd epyc_7282 -
amd epyc_7302_firmware -
amd epyc_7302 -
amd epyc_7302p_firmware -
amd epyc_7302p -
amd epyc_7352_firmware -
amd epyc_7352 -
amd epyc_7402_firmware -
amd epyc_7402 -
amd epyc_7402p_firmware -
amd epyc_7402p -
amd epyc_7452_firmware -
amd epyc_7452 -
amd epyc_7502_firmware -
amd epyc_7502 -
amd epyc_7502p_firmware -
amd epyc_7502p -
amd epyc_7532_firmware -
amd epyc_7532 -
amd epyc_7542_firmware -
amd epyc_7542 -
amd epyc_7552_firmware -
amd epyc_7552 -
amd epyc_7642_firmware -
amd epyc_7642 -
amd epyc_7662_firmware -
amd epyc_7662 -
amd epyc_7702_firmware -
amd epyc_7702 -
amd epyc_7742_firmware -
amd epyc_7742 -
amd epyc_7f32_firmware -
amd epyc_7f32 -
amd epyc_7f52_firmware -
amd epyc_7f52 -
amd epyc_7f72_firmware -
amd epyc_7f72 -
amd epyc_7h12_firmware -
amd epyc_7h12 -
amd epyc_7773x_firmware -
amd epyc_7773x -
amd epyc_7763_firmware -
amd epyc_7763 -
amd epyc_7713p_firmware -
amd epyc_7713p -
amd epyc_7713_firmware -
amd epyc_7713 -
amd epyc_7663_firmware -
amd epyc_7663 -
amd epyc_7643_firmware -
amd epyc_7643 -
amd epyc_75f3_firmware -
amd epyc_75f3 -
amd epyc_7573x_firmware -
amd epyc_7573x -
amd epyc_7543p_firmware -
amd epyc_7543p -
amd epyc_7543_firmware -
amd epyc_7543 -
amd epyc_7513_firmware -
amd epyc_7513 -
amd epyc_74f3_firmware -
amd epyc_74f3 -
amd epyc_7473x_firmware -
amd epyc_7473x -
amd epyc_7443p_firmware -
amd epyc_7443p -
amd epyc_7443_firmware -
amd epyc_7443 -
amd epyc_7413_firmware -
amd epyc_7413 -
amd epyc_7373x_firmware -
amd epyc_7373x -
amd epyc_7313_firmware -
amd epyc_7313 -
amd epyc_7313p_firmware -
amd epyc_7313p -
amd epyc_7343_firmware -
amd epyc_7343 -
amd epyc_72f3_firmware -
amd epyc_72f3 -
amd epyc_7003_firmware -
amd epyc_7003 -
fedoraproject fedora 35
fedoraproject fedora 37



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",