Vulnerabilites related to amd - epyc_7443_firmware
CVE-2021-26371 (GCVE-0-2021-26371)
Vulnerability from cvelistv5
Published
2023-05-09 18:59
Modified
2025-01-28 15:46
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A compromised or malicious ABL or UApp could
send a SHA256 system call to the bootloader, which may result in exposure of
ASP memory to userspace, potentially leading to information disclosure.
References
► | URL | Tags |
---|---|---|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.196Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26371", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:45:57.811621Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:46:02.389Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A compromised or malicious ABL or UApp could\nsend a SHA256 system call to the bootloader, which may result in exposure of\nASP memory to userspace, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "A compromised or malicious ABL or UApp could\nsend a SHA256 system call to the bootloader, which may result in exposure of\nASP memory to userspace, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:59:16.122Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26371", "datePublished": "2023-05-09T18:59:16.122Z", "dateReserved": "2021-01-29T21:24:26.152Z", "dateUpdated": "2025-01-28T15:46:02.389Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20528 (GCVE-0-2023-20528)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen EPYC |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20528", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:58:44.299784Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:35:25.086Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\u003cbr\u003e" } ], "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20528", "datePublished": "2023-01-10T20:57:03.392Z", "dateReserved": "2022-10-27T18:53:39.738Z", "dateUpdated": "2025-04-07T18:35:25.086Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20573 (GCVE-0-2023-20573)
Vulnerability from cvelistv5
Published
2024-01-11 13:53
Modified
2025-06-20 16:12
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A privileged attacker
can prevent delivery of debug exceptions to SEV-SNP guests potentially
resulting in guests not receiving expected debug information.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.236Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 3.2, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:L/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20573", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-01-11T20:36:55.598699Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-20T16:12:15.413Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] } ], "datePublic": "2024-01-09T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n" } ], "value": "A privileged attacker\ncan prevent delivery of debug exceptions to SEV-SNP guests potentially\nresulting in guests not receiving expected debug information.\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2024-01-11T13:53:52.581Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3006" } ], "source": { "advisory": "AMD-SB-3004", "discovery": "UNKNOWN" }, "title": "Debug Exception Delivery in Secure Nested Paging", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20573", "datePublished": "2024-01-11T13:53:52.581Z", "dateReserved": "2022-10-27T18:53:39.755Z", "dateUpdated": "2025-06-20T16:12:15.413Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26353 (GCVE-0-2021-26353)
Vulnerability from cvelistv5
Published
2022-05-10 18:33
Modified
2024-08-03 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen EPYC |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.535Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26353", "datePublished": "2022-05-10T18:33:42.470384Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-08-03T20:26:24.535Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20578 (GCVE-0-2023-20578)
Vulnerability from cvelistv5
Published
2024-08-13 16:52
Modified
2025-03-18 20:03
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow
an attacker with ring0 privileges and access to the
BIOS menu or UEFI shell to modify the communications buffer potentially
resulting in arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | AMD EPYC™ 7001 Processors | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7001", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.k" } ] }, { "cpes": [ "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7002", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.g" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_9004:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9004", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.2" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_3000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_3000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.1.0.a" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_7002:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_7002", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.a" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_7003:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_7003", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.7" } ] }, { "cpes": [ "cpe:2.3:a:amd:epyc_embedded_9003:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_embedded_9003", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.0" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_7000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_7000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.0" } ] }, { "cpes": [ "cpe:2.3:a:amd:ryzen_embedded_v3000:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "ryzen_embedded_v3000", "vendor": "amd", "versions": [ { "status": "unaffected", "version": "1.0.0.8" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20578", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-15T15:56:35.845479Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T20:03:43.905Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "PI", "product": "AMD EPYC\u2122 7001 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "NaplesPI 1.0.0.K", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7002 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RomePI 1.0.0.G" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.B" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 9004 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "GenoaPI 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM5 1.0.0.1" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ChagallWSPI-sWRX8 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MendocinoPI-FT6 1.0.0.0" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.9b" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.9b" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "SnowyOwl PI 1.1.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbRomePI-SP3 1.0.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbMilanPI-SP3 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbGenoaPI-SP5 1.0.0.0" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded 7000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedAM5PI 1.0.0.0" } ] }, { "defaultStatus": "affected", "product": "AMD RyzenTM Embedded V3000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP7r2 1.0.0.8" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications \u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003ebuffer\u0026nbsp;\u003c/a\u003epotentially\nresulting in arbitrary code execution.\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow\nan attacker with ring0 privileges and access to the\nBIOS menu or UEFI shell to modify the communications buffer\u00a0potentially\nresulting in arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:52:58.457Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20578", "datePublished": "2024-08-13T16:52:58.457Z", "dateReserved": "2022-10-27T18:53:39.757Z", "dateUpdated": "2025-03-18T20:03:43.905Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26370 (GCVE-0-2021-26370)
Vulnerability from cvelistv5
Published
2022-05-10 18:25
Modified
2024-09-16 22:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: unspecified < RomePI-SP3_1.0.0.C |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.820Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:25:17", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-26370", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26370", "datePublished": "2022-05-10T18:25:17.618373Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T22:20:14.838Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26349 (GCVE-0-2021-26349)
Vulnerability from cvelistv5
Published
2022-05-11 16:24
Modified
2024-09-17 01:05
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA).
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | EPYC™ Processors |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.008Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA)." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:24:22", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26349", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to assign a new report ID to an imported guest may potentially result in an SEV-SNP guest VM being tricked into trusting a dishonest Migration Agent (MA)." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26349", "datePublished": "2022-05-11T16:24:22.957466Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:05:40.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46778 (GCVE-0-2021-46778)
Vulnerability from cvelistv5
Published
2022-08-09 20:20
Modified
2024-09-17 00:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NA
Summary
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | AMD Processors |
Version: Processor Some AMD Processors |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.676Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Processor Some AMD Processors" } ] } ], "datePublic": "2022-08-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-09T20:20:12", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-08-09T16:00:00.000Z", "ID": "CVE-2021-46778", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMD Processors", "version": { "version_data": [ { "version_affected": "=", "version_name": "Processor", "version_value": "Some AMD Processors" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NA" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46778", "datePublished": "2022-08-09T20:20:12.911867Z", "dateReserved": "2022-03-31T00:00:00", "dateUpdated": "2024-09-17T00:36:13.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46744 (GCVE-0-2021-46744)
Vulnerability from cvelistv5
Published
2022-05-11 16:40
Modified
2024-09-16 23:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NA
Summary
An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | AMD Processors |
Version: Processor EPYC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.590Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Processor EPYC" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-08T17:07:10", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:30:00.000Z", "ID": "CVE-2021-46744", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMD Processors", "version": { "version_data": [ { "version_affected": "=", "version_name": "Processor", "version_value": "EPYC" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NA" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ] }, "source": { "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46744", "datePublished": "2022-05-11T16:40:21.925600Z", "dateReserved": "2022-03-31T00:00:00", "dateUpdated": "2024-09-16T23:46:24.093Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20529 (GCVE-0-2023-20529)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen EPYC |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20529", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:58:06.650420Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:34:54.131Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20529", "datePublished": "2023-01-10T20:57:04.799Z", "dateReserved": "2022-10-27T18:53:39.738Z", "dateUpdated": "2025-04-07T18:34:54.131Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12954 (GCVE-0-2020-12954)
Vulnerability from cvelistv5
Published
2021-11-16 18:11
Modified
2024-09-16 18:48
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-693 - Protection Mechanism Failure
Summary
A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.706Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:11:02", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2020-12954", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-693 Protection Mechanism Failure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12954", "datePublished": "2021-11-16T18:11:02.785753Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-16T18:48:26.077Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26344 (GCVE-0-2021-26344)
Vulnerability from cvelistv5
Published
2024-08-13 16:49
Modified
2025-03-18 15:35
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An out of bounds memory write when processing the AMD
PSP1 Configuration Block (APCB) could allow an attacker with access the ability
to modify the BIOS image, and the ability to sign the resulting image, to
potentially modify the APCB block resulting in arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | AMD EPYC™ 7001 Series Processors |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:h:amd:naplespi:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "naplespi", "vendor": "amd", "versions": [ { "lessThan": "1.0.0.k", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:romepi:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "romepi", "vendor": "amd", "versions": [ { "lessThan": "1.0.0.C", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:h:amd:milanpi:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "milanpi", "vendor": "amd", "versions": [ { "lessThan": "1.0.0.5", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2021-26344", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T18:29:11.333464Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-18T15:35:45.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7001 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7002 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RomePI 1.0.0.C" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.5" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4V2 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ComboAM4V2 1.2.0.A" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 5000WX Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "ChagallWSPI-sWRX8 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7020 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MendocinoPI-FT6 1.0.0.3" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 7035 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "RembrandtPI-FP7 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "CezannePI-FP6 1.0.0.E" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7002 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbRomePI-SP3 1.0.0.6" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbMilanPI-SP3 1.0.0.2" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded R2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded 5000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V1000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V2000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "v" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedPI-FP7r2 1.0.0.4" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution.\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "An out of bounds memory write when processing the AMD\nPSP1 Configuration Block (APCB) could allow an attacker with access the ability\nto modify the BIOS image, and the ability to sign the resulting image, to\npotentially modify the APCB block resulting in arbitrary code execution." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:49:52.889Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26344", "datePublished": "2024-08-13T16:49:52.889Z", "dateReserved": "2021-01-29T21:24:26.145Z", "dateUpdated": "2025-03-18T15:35:45.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20524 (GCVE-0-2023-20524)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:51
Severity ?
VLAI Severity ?
EPSS score ?
Summary
An attacker with a compromised ASP could
possibly send malformed commands to an ASP on another CPU, resulting in an out
of bounds write, potentially leading to a loss a loss of integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:45.864Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20524", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:51:30.500815Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:51:34.268Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An attacker with a compromised ASP could\npossibly send malformed commands to an ASP on another CPU, resulting in an out\nof bounds write, potentially leading to a loss a loss of integrity.\n\n\n\n\n\n\n\n" } ], "value": "An attacker with a compromised ASP could\npossibly send malformed commands to an ASP on another CPU, resulting in an out\nof bounds write, potentially leading to a loss a loss of integrity.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:54:00.877Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20524", "datePublished": "2023-05-09T18:36:29.876Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2025-01-28T15:51:34.268Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20520 (GCVE-0-2023-20520)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:54
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper access control settings in ASP
Bootloader may allow an attacker to corrupt the return address causing a
stack-based buffer overrun potentially leading to arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: various |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.261Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20520", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:54:12.407663Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:54:22.503Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper access control settings in ASP\nBootloader may allow an attacker to corrupt the return address causing a\nstack-based buffer overrun potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n" } ], "value": "Improper access control settings in ASP\nBootloader may allow an attacker to corrupt the return address causing a\nstack-based buffer overrun potentially leading to arbitrary code execution.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:53:42.276Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20520", "datePublished": "2023-05-09T18:36:29.141Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2025-01-28T15:54:22.503Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12961 (GCVE-0-2020-12961)
Vulnerability from cvelistv5
Published
2021-11-16 18:13
Modified
2024-09-17 04:13
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: unspecified < RomePI-SP3_1.0.0.C |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.051Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:13:39", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2020-12961", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12961", "datePublished": "2021-11-16T18:13:39.959506Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T04:13:59.255Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20523 (GCVE-0-2023-20523)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-07 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen EPYC |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.871Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20523", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:18:11.465497Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T15:47:41.028Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.\u003cbr\u003e" } ], "value": "TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20523", "datePublished": "2023-01-10T20:56:59.383Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2025-04-07T15:47:41.028Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20530 (GCVE-0-2023-20530)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen EPYC |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.921Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20530", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:57:23.417698Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:34:30.136Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient input validation of BIOS mailbox messages in SMU may result in out-of-bounds memory reads potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20530", "datePublished": "2023-01-10T20:57:06.132Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2025-04-07T18:34:30.136Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46771 (GCVE-0-2021-46771)
Vulnerability from cvelistv5
Published
2022-05-10 18:30
Modified
2024-09-17 04:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.514Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:30:03", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-46771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of addresses in AMD Secure Processor (ASP) firmware system call may potentially lead to arbitrary code execution by a compromised user application." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46771", "datePublished": "2022-05-10T18:30:03.257543Z", "dateReserved": "2022-03-31T00:00:00", "dateUpdated": "2024-09-17T04:09:13.761Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26340 (GCVE-0-2021-26340)
Vulnerability from cvelistv5
Published
2021-12-10 21:55
Modified
2024-09-16 16:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NA
Summary
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
References
► | URL | Tags |
---|---|---|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.922Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThanOrEqual": "3rd gen EPYC", "status": "affected", "version": "Processor", "versionType": "custom" } ] } ], "datePublic": "2021-12-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-12-10T21:55:10", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ], "source": { "advisory": "AMD-SB-1023", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-12-06T20:30:00.000Z", "ID": "CVE-2021-26340", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "Processor", "version_value": "3rd gen EPYC" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "NA" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ] }, "source": { "advisory": "AMD-SB-1023", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26340", "datePublished": "2021-12-10T21:55:10.021622Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:29:03.775Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-31347 (GCVE-0-2023-31347)
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2025-03-17 17:46
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Due to a code bug in
Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a
guest to observe an incorrect TSC when Secure TSC is enabled potentially
resulting in a loss of guest integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:31.084Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-31347", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-16T19:50:42.676211Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-682", "description": "CWE-682 Incorrect Calculation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-17T17:46:05.955Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2024-02-14T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \u0026nbsp;\n\n\n\n\u003cbr\u003e" } ], "value": "Due to a code bug in\nSecure_TSC, SEV firmware may allow an attacker with high privileges to cause a\nguest to observe an incorrect TSC when Secure TSC is enabled potentially\nresulting in a loss of guest integrity. \u00a0\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2024-02-13T19:18:51.045Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "source": { "advisory": "AMD-SB-3007", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31347", "datePublished": "2024-02-13T19:18:51.045Z", "dateReserved": "2023-04-27T15:25:41.427Z", "dateUpdated": "2025-03-17T17:46:05.955Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26322 (GCVE-0-2021-26322)
Vulnerability from cvelistv5
Published
2021-11-16 17:58
Modified
2024-09-17 00:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-320 - Key Management Errors
Summary
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.397Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-320", "description": "CWE-320 Key Management Errors", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:58:40", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26322", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-320 Key Management Errors" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26322", "datePublished": "2021-11-16T17:58:40.230958Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T00:56:29.964Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20521 (GCVE-0-2023-20521)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Severity ?
VLAI Severity ?
EPSS score ?
Summary
TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Athlon™ 3000 Series Desktop Processors with Radeon™ Graphics “Picasso” AM4 |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20521", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-11-27T19:38:18.334372Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-07-26T14:56:31.535Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.873Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics \u201cPicasso\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile Processor with Radeon\u2122 Graphics \u201cPicasso\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded R2000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded V1000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:42:56.250Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20521", "datePublished": "2023-11-14T18:52:31.662Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:36.873Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26321 (GCVE-0-2021-26321)
Vulnerability from cvelistv5
Published
2021-11-16 18:07
Modified
2024-09-16 18:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.280Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:07:26", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26321", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26321", "datePublished": "2021-11-16T18:07:26.527350Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:56:13.855Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26323 (GCVE-0-2021-26323)
Vulnerability from cvelistv5
Published
2021-11-16 18:14
Modified
2024-09-16 23:45
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:14:43", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26323", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26323", "datePublished": "2021-11-16T18:14:43.401480Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T23:45:40.552Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26404 (GCVE-0-2021-26404)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-08 20:22
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen EPYC |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.180Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26404", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T20:20:43.599778Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T20:22:33.575Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.\u003cbr\u003e" } ], "value": "Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26404", "datePublished": "2023-01-10T20:56:44.456Z", "dateReserved": "2021-01-29T21:24:26.170Z", "dateUpdated": "2025-04-08T20:22:33.575Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-31346 (GCVE-0-2023-31346)
Vulnerability from cvelistv5
Published
2024-02-13 19:18
Modified
2025-03-20 20:27
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||
|
{ "containers": { "adp": [ { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-31346", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-02-21T20:06:47.743045Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-20T20:27:50.012Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-02T14:53:30.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2024-02-13T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2024-02-13T19:18:21.462Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "source": { "advisory": "AMD-SB-3007", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31346", "datePublished": "2024-02-13T19:18:19.089Z", "dateReserved": "2023-04-27T15:25:41.427Z", "dateUpdated": "2025-03-20T20:27:50.012Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20566 (GCVE-0-2023-20566)
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-12-03 14:26
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.943Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20566", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2023-11-27T20:58:09.078592Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-03T14:26:45.381Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:36:52.542Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" } ], "source": { "advisory": "AMD-SB-3002", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20566", "datePublished": "2023-11-14T18:54:00.908Z", "dateReserved": "2022-10-27T18:53:39.753Z", "dateUpdated": "2024-12-03T14:26:45.381Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26347 (GCVE-0-2021-26347)
Vulnerability from cvelistv5
Published
2022-05-11 16:22
Modified
2024-08-03 20:26
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | Ryzen 5000 Series |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.052Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 5000 Series", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service." } ], "value": "Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843980Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" } ], "source": { "advisory": "AMD-SB-1031", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26347", "datePublished": "2022-05-11T16:22:09.774768Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-08-03T20:26:25.052Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26328 (GCVE-0-2021-26328)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 15:11
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen EPYC |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26328", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T15:11:51.526597Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-358", "description": "CWE-358 Improperly Implemented Security Check for Standard", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T15:11:57.590Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.\n\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26328", "datePublished": "2023-01-10T20:56:33.464Z", "dateReserved": "2021-01-29T21:24:26.141Z", "dateUpdated": "2025-04-09T15:11:57.590Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20584 (GCVE-0-2023-20584)
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2024-11-05 21:40
Severity ?
VLAI Severity ?
EPSS score ?
Summary
IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | AMD | AMD EPYC™ 7003 Processors | ||
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-20584", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-13T17:31:27.946120Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-05T21:40:37.392Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.C", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 9004 Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "GenoaPI 1.0.0.B" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eIOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised \u003ca target=\"_blank\" rel=\"nofollow\"\u003eHypervisor \u003c/a\u003eto\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity.\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\n\n\u003cdiv\u003e\n\n\n\n\n\n\u003cdiv\u003e\n\n\u003cdiv\u003e\u003ca target=\"_blank\" rel=\"nofollow\"\u003e\u003c/a\u003e\n\n\u003cp\u003e\u003cbr\u003e\u003c/p\u003e\u003c/div\u003e\u003c/div\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:53:18.373Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20584", "datePublished": "2024-08-13T16:53:18.373Z", "dateReserved": "2022-10-27T18:53:39.759Z", "dateUpdated": "2024-11-05T21:40:37.392Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46764 (GCVE-0-2021-46764)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:59
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper validation of DRAM addresses in SMU may
allow an attacker to overwrite sensitive memory locations within the ASP
potentially resulting in a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.271Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46764", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:58:54.474569Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:59:14.778Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper validation of DRAM addresses in SMU may\nallow an attacker to overwrite sensitive memory locations within the ASP\npotentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Improper validation of DRAM addresses in SMU may\nallow an attacker to overwrite sensitive memory locations within the ASP\npotentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:52:22.650Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46764", "datePublished": "2023-05-09T18:36:24.562Z", "dateReserved": "2022-03-31T16:50:27.870Z", "dateUpdated": "2025-01-28T15:59:14.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26343 (GCVE-0-2021-26343)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 13:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen EPYC |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26343", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T13:24:06.614880Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-668", "description": "CWE-668 Exposure of Resource to Wrong Sphere", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T13:25:42.403Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.\u003cbr\u003e\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.\n\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26343", "datePublished": "2023-01-10T20:56:34.870Z", "dateReserved": "2021-01-29T21:24:26.144Z", "dateUpdated": "2025-04-09T13:25:42.403Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26348 (GCVE-0-2021-26348)
Vulnerability from cvelistv5
Published
2022-05-11 16:26
Modified
2024-09-16 16:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | EPYC™ Processors |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.674Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:26:16", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26348", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26348", "datePublished": "2022-05-11T16:26:16.451702Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:27:57.232Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26355 (GCVE-0-2021-26355)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 14:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen EPYC |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.057Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26355", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:56:03.691250Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:56:35.656Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26355", "datePublished": "2023-01-10T20:56:37.810Z", "dateReserved": "2021-01-29T21:24:26.148Z", "dateUpdated": "2025-04-09T14:56:35.656Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26379 (GCVE-0-2021-26379)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:02
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient input validation of mailbox data in the
SMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially
leading to a loss of integrity and privilege escalation.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.077Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26379", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T16:02:33.399399Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T16:02:38.949Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation of mailbox data in the\nSMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially\nleading to a loss of integrity and privilege escalation.\n\n\n\n" } ], "value": "Insufficient input validation of mailbox data in the\nSMU may allow an attacker to coerce the SMU to corrupt SMRAM, potentially\nleading to a loss of integrity and privilege escalation.\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:50:00.247Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26379", "datePublished": "2023-05-09T18:36:18.303Z", "dateReserved": "2021-01-29T21:24:26.158Z", "dateUpdated": "2025-01-28T16:02:38.949Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26329 (GCVE-0-2021-26329)
Vulnerability from cvelistv5
Published
2021-11-16 17:57
Modified
2024-09-16 22:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-130 - Improper Handling of Length Parameter Inconsistency
Summary
AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-130", "description": "CWE-130 Improper Handling of Length Parameter Inconsistency", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:57:01", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26329", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD System Management Unit (SMU) may experience an integer overflow when an invalid length is provided which may result in a potential loss of resources." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-130 Improper Handling of Length Parameter Inconsistency" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26329", "datePublished": "2021-11-16T17:57:01.031900Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T22:24:45.920Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12951 (GCVE-0-2020-12951)
Vulnerability from cvelistv5
Published
2021-11-16 18:06
Modified
2024-09-17 01:35
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ Series |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:16:35", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2020-12951", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12951", "datePublished": "2021-11-16T18:06:30.578358Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T01:35:37.916Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26320 (GCVE-0-2021-26320)
Vulnerability from cvelistv5
Published
2021-11-16 18:05
Modified
2024-09-16 18:34
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-295 - Improper Certificate Validation
Summary
Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-295", "description": "CWE-295 Improper Certificate Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:05:10", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26320", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP" } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-295 Improper Certificate Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26320", "datePublished": "2021-11-16T18:05:10.770439Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:34:19.728Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26339 (GCVE-0-2021-26339)
Vulnerability from cvelistv5
Published
2022-05-11 16:18
Modified
2024-09-17 01:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
A bug in AMD CPU’s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | EPYC™ Processors |
Version: various |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.938Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "A bug in AMD CPU\u2019s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:18:02", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A bug in AMD CPU\u2019s core logic may allow for an attacker, using specific code from an unprivileged VM, to trigger a CPU core hang resulting in a potential denial of service. AMD believes the specific code includes a specific x86 instruction sequence that would not be generated by compilers." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26339", "datePublished": "2022-05-11T16:18:02.079030Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:56:55.986Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20525 (GCVE-0-2023-20525)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen EPYC |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.913Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20525", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:17:27.182176Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T15:47:21.531Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.\u003cbr\u003e" } ], "value": "Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20525", "datePublished": "2023-01-10T20:57:00.713Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2025-04-07T15:47:21.531Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26402 (GCVE-0-2021-26402)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-08 20:27
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen EPYC |
Version: Various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.169Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26402", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-08T20:26:11.401792Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-08T20:27:13.237Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity and availability.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26402", "datePublished": "2023-01-10T20:56:41.784Z", "dateReserved": "2021-01-29T21:24:26.169Z", "dateUpdated": "2025-04-08T20:27:13.237Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20533 (GCVE-0-2023-20533)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ 3000 series Desktop Processors “Matisse" |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.915Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 series Desktop Processors \u201cMatisse\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded 5000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:34:28.851Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20533", "datePublished": "2023-11-14T18:52:52.106Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2024-08-02T09:05:36.915Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46775 (GCVE-0-2021-46775)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:56
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper input validation in ABL may enable an
attacker with physical access, to perform arbitrary memory overwrites,
potentially leading to a loss of integrity and code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.634Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46775", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:56:46.211758Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:56:51.087Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper input validation in ABL may enable an\nattacker with physical access, to perform arbitrary memory overwrites,\npotentially leading to a loss of integrity and code execution.\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Improper input validation in ABL may enable an\nattacker with physical access, to perform arbitrary memory overwrites,\npotentially leading to a loss of integrity and code execution.\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:53:06.367Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46775", "datePublished": "2023-05-09T18:36:26.852Z", "dateReserved": "2022-03-31T16:50:27.874Z", "dateUpdated": "2025-01-28T15:56:51.087Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46762 (GCVE-0-2021-46762)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:00
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient input validation in the SMU may
allow an attacker to corrupt SMU SRAM potentially leading to a loss of
integrity or denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.237Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46762", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T16:00:37.213474Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T16:00:40.217Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service." } ], "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:39:53.600Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-3001, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46762", "datePublished": "2023-05-09T18:36:23.081Z", "dateReserved": "2022-03-31T16:50:27.869Z", "dateUpdated": "2025-01-28T16:00:40.217Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23824 (GCVE-0-2022-23824)
Vulnerability from cvelistv5
Published
2022-11-09 20:48
Modified
2025-02-13 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- NA
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | AMD Processors |
Version: Processor various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.071Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues", "tags": [ "mailing-list", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "name": "FEDORA-2022-9f51d13fa3", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "name": "FEDORA-2022-53a4a5dd11", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "name": "DSA-5378", "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5378" }, { "tags": [ "x_transferred" ], "url": "https://security.gentoo.org/glsa/202402-07" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "AMD Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Processor various" } ] } ], "datePublic": "2022-11-08T00:00:00.000Z", "descriptions": [ { "lang": "en", "value": "IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure." } ], "problemTypes": [ { "descriptions": [ { "description": "NA", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-17T01:23:48.000Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040" }, { "name": "[oss-security] 20221110 Xen Security Advisory 422 v2 (CVE-2022-23824) - x86: Multiple speculative security issues", "tags": [ "mailing-list" ], "url": "http://www.openwall.com/lists/oss-security/2022/11/10/2" }, { "name": "FEDORA-2022-9f51d13fa3", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/" }, { "name": "FEDORA-2022-53a4a5dd11", "tags": [ "vendor-advisory" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/" }, { "name": "DSA-5378", "tags": [ "vendor-advisory" ], "url": "https://www.debian.org/security/2023/dsa-5378" }, { "url": "https://security.gentoo.org/glsa/202402-07" } ], "source": { "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23824", "datePublished": "2022-11-09T20:48:06.826Z", "dateReserved": "2022-01-21T00:00:00.000Z", "dateUpdated": "2025-02-13T16:32:23.589Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20591 (GCVE-0-2023-20591)
Vulnerability from cvelistv5
Published
2024-08-13 16:53
Modified
2025-03-13 16:41
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper re-initialization of IOMMU during the DRTM event
may permit an untrusted platform configuration to persist, allowing an attacker
to read or modify hypervisor memory, potentially resulting in loss of
confidentiality, integrity, and availability.
References
► | URL | Tags |
---|---|---|
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7003_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.b", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9003_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.8", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7773x_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.b", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9754s_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.8", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2023-20591", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-14T13:13:17.696799Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-03-13T16:41:15.645Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "AMD EPYC\u2122 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "MilanPI 1.0.0.B", "versionType": "PI" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 9004 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "Genoa 1.0.0.8" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbMilanPI-SP3 1.0.0.7" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003 Series Processors", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbGenoaPI-SP5 1.0.0.3" } ] } ], "datePublic": "2024-08-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability.\n\n\n\n\n\n\n\n\u003cdiv\u003e\u003cdiv\u003e\u003cdiv\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\u003c/div\u003e\n\n\n\n\n\n\u003c/span\u003e" } ], "value": "Improper re-initialization of IOMMU during the DRTM event\nmay permit an untrusted platform configuration to persist, allowing an attacker\nto read or modify hypervisor memory, potentially resulting in loss of\nconfidentiality, integrity, and availability." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-13T16:53:23.681Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20591", "datePublished": "2024-08-13T16:53:23.681Z", "dateReserved": "2022-10-27T18:53:39.761Z", "dateUpdated": "2025-03-13T16:41:15.645Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26356 (GCVE-0-2021-26356)
Vulnerability from cvelistv5
Published
2023-05-09 18:58
Modified
2025-01-28 15:48
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A TOCTOU in ASP bootloader may allow an attacker
to tamper with the SPI ROM following data read to memory potentially resulting
in S3 data corruption and information disclosure.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ 3000 Series Desktop Processors “Matisse” AM4 |
Version: various |
||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.804Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26356", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:48:34.459184Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-367", "description": "CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:48:38.470Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:58:48.108Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26356", "datePublished": "2023-05-09T18:58:48.108Z", "dateReserved": "2021-01-29T21:24:26.149Z", "dateUpdated": "2025-01-28T15:48:38.470Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26315 (GCVE-0-2021-26315)
Vulnerability from cvelistv5
Published
2021-11-16 18:12
Modified
2024-09-17 01:21
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-345 - Insufficient Verification of Data Authenticity
Summary
When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.391Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:12:07", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26315", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "When the AMD Platform Security Processor (PSP) boot rom loads, authenticates, and subsequently decrypts an encrypted FW, due to insufficient verification of the integrity of decrypted image, arbitrary code may be executed in the PSP when encrypted firmware images are used." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-345 Insufficient Verification of Data Authenticity" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26315", "datePublished": "2021-11-16T18:12:07.291241Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:21:40.952Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26336 (GCVE-0-2021-26336)
Vulnerability from cvelistv5
Published
2021-11-16 18:04
Modified
2024-09-16 17:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ Series |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.912Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:44:49", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26336", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26336", "datePublished": "2021-11-16T18:04:08.054768Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:33:06.189Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26332 (GCVE-0-2021-26332)
Vulnerability from cvelistv5
Published
2022-05-10 18:26
Modified
2024-09-16 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:26:52", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-26332", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26332", "datePublished": "2022-05-10T18:26:52.115269Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:23:38.341Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12988 (GCVE-0-2020-12988)
Vulnerability from cvelistv5
Published
2021-06-11 21:50
Modified
2024-09-16 16:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- TBD
Summary
A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 1st/2nd/3rd Gen AMD EPYC™ Processors |
Version: N/A |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.981Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted." } ], "problemTypes": [ { "descriptions": [ { "description": "TBD", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-09T22:05:41", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:30:00.000Z", "ID": "CVE-2020-12988", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "version": { "version_data": [ { "version_value": "N/A" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "TBD" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12988", "datePublished": "2021-06-11T21:50:22.301328Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-16T16:33:44.366Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46763 (GCVE-0-2021-46763)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:00
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient input validation in the SMU may
enable a privileged attacker to write beyond the intended bounds of a shared
memory buffer potentially leading to a loss of integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.477Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46763", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:59:51.899664Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T16:00:03.817Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may\nenable a privileged attacker to write beyond the intended bounds of a shared\nmemory buffer potentially leading to a loss of integrity.\n\n\n\n\n\n\n\n" } ], "value": "Insufficient input validation in the SMU may\nenable a privileged attacker to write beyond the intended bounds of a shared\nmemory buffer potentially leading to a loss of integrity.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:52:03.128Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46763", "datePublished": "2023-05-09T18:36:23.834Z", "dateReserved": "2022-03-31T16:50:27.870Z", "dateUpdated": "2025-01-28T16:00:03.817Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23830 (GCVE-0-2022-23830)
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 03:51
Severity ?
VLAI Severity ?
EPSS score ?
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:45.987Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPY\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:41:52.383Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23830", "datePublished": "2023-11-14T18:53:28.408Z", "dateReserved": "2022-01-21T17:20:55.781Z", "dateUpdated": "2024-08-03T03:51:45.987Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26338 (GCVE-0-2021-26338)
Vulnerability from cvelistv5
Published
2021-11-16 17:53
Modified
2024-09-17 01:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-284 - Improper Access Control
Summary
Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: unspecified < RomePI-SP3_1.0.0.C |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.933Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "CWE-284 Improper Access Control", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:53:50", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26338", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access controls in System Management Unit (SMU) may allow for an attacker to override performance control tables located in DRAM resulting in a potential lack of system resources." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-284 Improper Access Control" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26338", "datePublished": "2021-11-16T17:53:50.233501Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T01:56:07.563Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26397 (GCVE-0-2021-26397)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 16:01
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient address validation, may allow an
attacker with a compromised ABL and UApp to corrupt sensitive memory locations
potentially resulting in a loss of integrity or availability.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.294Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26397", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T16:01:44.320117Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T16:01:49.226Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n" } ], "value": "Insufficient address validation, may allow an\nattacker with a compromised ABL and UApp to corrupt sensitive memory locations\npotentially resulting in a loss of integrity or availability.\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:51:10.456Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26397", "datePublished": "2023-05-09T18:36:19.135Z", "dateReserved": "2021-01-29T21:24:26.165Z", "dateUpdated": "2025-01-28T16:01:49.226Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20532 (GCVE-0-2023-20532)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen EPYC |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20532", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:55:46.581295Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:33:14.880Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20532", "datePublished": "2023-01-10T20:57:08.762Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2025-04-07T18:33:14.880Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21980 (GCVE-0-2024-21980)
Vulnerability from cvelistv5
Published
2024-08-05 16:06
Modified
2024-08-05 21:00
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7003_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.9_sp3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9003_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.7_sp5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7773x_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.d", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9754s_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.c", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-21980", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-05T20:52:33.557459Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-05T21:00:57.665Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI 1.0.0.D", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "GenoaPI 1.0.0.C", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "lessThan": "EmbMilanPI-SP3 1.0.0.9", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "lessThan": "EmbGenoaPI-SP5 1.0.0.7", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] } ], "datePublic": "2024-08-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest\u0027s memory or UMC seed resulting in loss of confidentiality and integrity.\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest\u0027s memory or UMC seed resulting in loss of confidentiality and integrity." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 7.9, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-05T16:06:36.216Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2024-21980", "datePublished": "2024-08-05T16:06:36.216Z", "dateReserved": "2024-01-03T16:43:30.197Z", "dateUpdated": "2024-08-05T21:00:57.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26335 (GCVE-0-2021-26335)
Vulnerability from cvelistv5
Published
2021-11-16 18:08
Modified
2024-09-16 18:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ Series |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.907Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:25:06", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26335", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26335", "datePublished": "2021-11-16T18:08:39.387145Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:24:42.318Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26331 (GCVE-0-2021-26331)
Vulnerability from cvelistv5
Published
2021-11-16 18:09
Modified
2024-09-16 21:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.953Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:09:35", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26331", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26331", "datePublished": "2021-11-16T18:09:35.653452Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T21:03:02.452Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12946 (GCVE-0-2020-12946)
Vulnerability from cvelistv5
Published
2021-11-16 18:01
Modified
2024-09-17 00:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ Series |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.980Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:29:08", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2020-12946", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in ASP firmware for discrete TPM commands could allow a potential loss of integrity and denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12946", "datePublished": "2021-11-16T18:01:28.187239Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T00:55:32.489Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20594 (GCVE-0-2023-20594)
Vulnerability from cvelistv5
Published
2023-09-20 17:27
Modified
2025-06-27 21:41
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-824 - Access of Uninitialized Pointer
Summary
Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ 3000 Series Desktop Processors “Matisse” |
Version: various |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.973Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20594", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T15:25:52.143486Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T15:26:01.771Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processor with Radeon\u2122 Graphics \u201cCezanne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics \u201cRenoir\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors \u201cChagall\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 4000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d FP6", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cCezanne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 6000 Series Mobile Processors with Radeon\u2122 Graphics \"Rembrandt\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 7035 Series Mobile Processors with Radeon\u2122 Graphics \"Rembrandt-R\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \"Barcelo\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 7030 Series Mobile Processors with Radeon\u2122 Graphics \u201cBarcelo-R\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded 7000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "EmbeddedAM5PI 1.0.0.1" } ] }, { "defaultStatus": "affected", "product": "AMD Ryzen\u2122 Embedded V3000", "vendor": "AMD", "versions": [ { "status": "unaffected", "version": "Embedded-PI_FP7r2 1.0.0.B" } ] } ], "datePublic": "2023-09-20T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eImproper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.\u003c/span\u003e" } ], "value": "Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-824", "description": "CWE-824 Access of Uninitialized Pointer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-27T21:41:58.197Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4007" } ], "source": { "advisory": "AMD-SB-4007", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20594", "datePublished": "2023-09-20T17:27:59.742Z", "dateReserved": "2022-10-27T18:53:39.762Z", "dateUpdated": "2025-06-27T21:41:58.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46756 (GCVE-0-2021-46756)
Vulnerability from cvelistv5
Published
2023-05-09 19:00
Modified
2025-01-28 15:38
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient validation of inputs in
SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an
attacker with a malicious Uapp or ABL to send malformed or invalid syscall to
the bootloader resulting in a potential denial of service and loss of
integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4 |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.446Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46756", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:38:16.732242Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:38:19.211Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Desktop Processors \u201cPinnacle Ridge\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop processor with Radeon\u2122 Graphics \u201cCezanne\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile processors with Radeon\u2122 Graphics \u201cCezanne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient validation of inputs in\nSVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an\nattacker with a malicious Uapp or ABL to send malformed or invalid syscall to\nthe bootloader resulting in a potential denial of service and loss of\nintegrity.\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T19:00:35.599Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46756", "datePublished": "2023-05-09T19:00:35.599Z", "dateReserved": "2022-03-31T16:50:27.868Z", "dateUpdated": "2025-01-28T15:38:19.211Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-31355 (GCVE-0-2023-31355)
Vulnerability from cvelistv5
Published
2024-08-05 16:04
Modified
2024-08-06 14:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2023-31355", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-08-06T14:07:12.426239Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-06T14:58:40.899Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI 1.0.0.D", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "GenoaPI 1.0.0.C", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "lessThan": "EmbMilanPI-SP3 1.0.0.9", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "lessThan": "EmbGenoaPI-SP5 1.0.0.7", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] } ], "datePublic": "2024-08-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest\u0027s UMC seed potentially allowing reading of memory from a decommissioned guest.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest\u0027s UMC seed potentially allowing reading of memory from a decommissioned guest." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-05T16:04:24.813Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-31355", "datePublished": "2024-08-05T16:04:24.813Z", "dateReserved": "2023-04-27T15:25:41.428Z", "dateUpdated": "2024-08-06T14:58:40.899Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26330 (GCVE-0-2021-26330)
Vulnerability from cvelistv5
Published
2021-11-16 18:19
Modified
2024-09-16 18:12
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-122 - Heap-based Buffer Overflow
Summary
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ |
Version: unspecified < NaplesPI-SP3_1.0.0.G |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.947Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "NaplesPI-SP3_1.0.0.G", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "2nd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "RomePI-SP3_1.0.0.C", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-122", "description": "CWE-122 Heap-based Buffer Overflow", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:19:29", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26330", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "NaplesPI-SP3_1.0.0.G" } ] } }, { "product_name": "2nd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "RomePI-SP3_1.0.0.C" } ] } }, { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-122 Heap-based Buffer Overflow" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26330", "datePublished": "2021-11-16T18:19:29.476922Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T18:12:54.960Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26326 (GCVE-0-2021-26326)
Vulnerability from cvelistv5
Published
2021-11-16 17:52
Modified
2024-09-16 17:53
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-665 - Improper Initialization
Summary
Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.339Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T17:52:14", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26326", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to validate VM_HSAVE_PA during SNP_INIT may result in a loss of memory integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-665 Improper Initialization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26326", "datePublished": "2021-11-16T17:52:14.020889Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:53:16.999Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46769 (GCVE-0-2021-46769)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:57
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient syscall input validation in the ASP
Bootloader may allow a privileged attacker to execute arbitrary DMA copies,
which can lead to code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-46769", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:57:47.847749Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:57:52.765Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:52:44.759Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46769", "datePublished": "2023-05-09T18:36:25.695Z", "dateReserved": "2022-03-31T16:50:27.872Z", "dateUpdated": "2025-01-28T15:57:52.765Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26312 (GCVE-0-2021-26312)
Vulnerability from cvelistv5
Published
2021-11-16 17:55
Modified
2024-09-16 17:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-665 - Improper Initialization
Summary
Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | EPYC™ Processors |
Version: various |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.142Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-665", "description": "CWE-665 Improper Initialization", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:30:46", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26312", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-665 Improper Initialization" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1027 and AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26312", "datePublished": "2021-11-16T17:55:24.198997Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:54:14.669Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20526 (GCVE-0-2023-20526)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | AMD Ryzen™ Threadripper™ 2000 Series Processors “Colfax” |
Version: various |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.942Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.\u003cbr\u003e" } ], "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:43:52.998Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20526", "datePublished": "2023-11-14T18:52:41.992Z", "dateReserved": "2022-10-27T18:53:39.737Z", "dateUpdated": "2024-08-02T09:05:36.942Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26354 (GCVE-0-2021-26354)
Vulnerability from cvelistv5
Published
2023-05-09 18:58
Modified
2025-01-28 15:50
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient bounds checking in ASP may allow an
attacker to issue a system call from a compromised ABL which may cause
arbitrary memory values to be initialized to zero, potentially leading to a
loss of integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ 2000 series Desktop Processors “Raven Ridge” AM4 |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.140Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26354", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:50:31.473767Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:50:35.057Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 series Desktop Processors \u201cRaven Ridge\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Desktop Processors \u201cPinnacle Ridge\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors \u201cMatisse\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop processor with Radeon\u2122 Graphics \u201cCezanne\u201d AM4", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cColfax\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD Ryzen\u2122 Threadripper\u2122 Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cDali\u201d/\u201dDali\u201d ULP", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cPollock\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 2000 Series Mobile Processors \u201cRaven Ridge\u201d FP5", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile processor, 2nd Gen AMD Ryzen\u2122 Mobile Processors with Radeon\u2122 Graphics \u201cPicasso\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics \u201cRenoir\u201d ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile Processors with Radeon\u2122 Graphics \u201cLucienne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Mobile processors with Radeon\u2122 Graphics \u201cCezanne\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bounds checking in ASP may allow an\nattacker to issue a system call from a compromised ABL which may cause\narbitrary memory values to be initialized to zero, potentially leading to a\nloss of integrity.\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient bounds checking in ASP may allow an\nattacker to issue a system call from a compromised ABL which may cause\narbitrary memory values to be initialized to zero, potentially leading to a\nloss of integrity.\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:58:37.664Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-4001, AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26354", "datePublished": "2023-05-09T18:58:37.664Z", "dateReserved": "2021-01-29T21:24:26.148Z", "dateUpdated": "2025-01-28T15:50:35.057Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12966 (GCVE-0-2020-12966)
Vulnerability from cvelistv5
Published
2022-02-04 22:29
Modified
2024-09-17 01:06
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- TBD
Summary
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 1st/2nd/3rd Gen AMD EPYC™ Processors |
Version: unspecified < undefined |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:19.042Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "undefined", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-08-10T00:00:00", "descriptions": [ { "lang": "en", "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor." } ], "problemTypes": [ { "descriptions": [ { "description": "TBD", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-08T17:06:45", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ], "source": { "advisory": "AMD-SB-1013", "discovery": "EXTERNAL" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-08-10T19:30:00.000Z", "ID": "CVE-2020-12966", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "1st/2nd/3rd Gen AMD EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "TBD" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "name": "[oss-security] 20220808 wolfSSL 5.4.0 fixes CVE-2022-34293 and other issues", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" } ] }, "source": { "advisory": "AMD-SB-1013", "discovery": "EXTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12966", "datePublished": "2022-02-04T22:29:12.748016Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-17T01:06:34.720Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20527 (GCVE-0-2023-20527)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen EPYC |
Version: various |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.888Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20527", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:15:59.447266Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T15:47:00.818Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "1st Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.\u003cbr\u003e" } ], "value": "Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20527", "datePublished": "2023-01-10T20:57:02.034Z", "dateReserved": "2022-10-27T18:53:39.738Z", "dateUpdated": "2025-04-07T15:47:00.818Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26337 (GCVE-0-2021-26337)
Vulnerability from cvelistv5
Published
2021-11-16 18:24
Modified
2024-09-17 03:49
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ Series |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:23.926Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T17:42:04", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26337", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26337", "datePublished": "2021-11-16T18:24:01.483891Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T03:49:09.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26342 (GCVE-0-2021-26342)
Vulnerability from cvelistv5
Published
2022-05-11 16:21
Modified
2024-09-16 16:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | EPYC™ Processors |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.602Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:21:04", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ], "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2021-26342", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "EPYC\u2122 Processors", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1028" } ] }, "source": { "advisory": "AMD-SB-1028", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26342", "datePublished": "2022-05-11T16:21:04.403325Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:32:42.078Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20592 (GCVE-0-2023-20592)
Vulnerability from cvelistv5
Published
2023-11-14 18:54
Modified
2024-10-11 18:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ Processors |
Version: various |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.266Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-20592", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T17:51:51.383280Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T18:07:49.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": " ", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": " ", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity.\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-11-14T18:54:13.255Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005" } ], "source": { "advisory": "AMD-SB-3005", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20592", "datePublished": "2023-11-14T18:54:13.255Z", "dateReserved": "2022-10-27T18:53:39.762Z", "dateUpdated": "2024-10-11T18:07:49.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26324 (GCVE-0-2021-26324)
Vulnerability from cvelistv5
Published
2022-05-10 18:27
Modified
2024-09-16 17:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.327Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2022-05-06T00:00:00", "descriptions": [ { "lang": "en", "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-10T18:27:30", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-06T20:00:00.000Z", "ID": "CVE-2021-26324", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26324", "datePublished": "2022-05-10T18:27:30.491069Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T17:54:12.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-46774 (GCVE-0-2021-46774)
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-10-11 18:07
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ 3000 series Desktop Processors “Matisse" |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T05:17:42.622Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2021-46774", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-11T17:51:52.542045Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-11T18:07:59.642Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 series Desktop Processors \u201cMatisse\"", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 5000 Series Desktop Processors \u201cVermeer\u201d", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 3000 Series Processors \u201cCastle Peak\u201d HEDT", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO Processors \u201cCastle Peak\u201d WS SP3", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "AMD Ryzen\u2122 Threadripper\u2122 PRO 3000WX Series Processors \u201cChagall\u201d WS", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD Ryzen\u2122 Embedded 5000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 3000", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:31:43.449Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-46774", "datePublished": "2023-11-14T18:52:11.012Z", "dateReserved": "2022-03-31T16:50:27.874Z", "dateUpdated": "2024-10-11T18:07:59.642Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26396 (GCVE-0-2021-26396)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 14:54
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen EPYC |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:25.145Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26396", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:54:48.208922Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-345", "description": "CWE-345 Insufficient Verification of Data Authenticity", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:54:52.802Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26396", "datePublished": "2023-01-10T20:56:39.130Z", "dateReserved": "2021-01-29T21:24:26.165Z", "dateUpdated": "2025-04-09T14:54:52.802Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23818 (GCVE-0-2022-23818)
Vulnerability from cvelistv5
Published
2023-05-09 18:36
Modified
2025-01-28 15:55
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Insufficient input validation on the model
specific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest
memory integrity.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: various |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2022-23818", "options": [ { "Exploitation": "none" }, { "Automatable": "yes" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-01-28T15:55:48.519453Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "description": "CWE-noinfo Not enough information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-01-28T15:55:54.421Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-05-09T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "Insufficient input validation on the model\nspecific register: VM_HSAVE_PA may potentially lead to loss of SEV-SNP guest\nmemory integrity.\n\n\n\n\n\n\n\n \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-05-09T18:53:23.338Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "source": { "advisory": "AMD-SB-3001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2022-23818", "datePublished": "2023-05-09T18:36:28.387Z", "dateReserved": "2022-01-21T17:20:55.777Z", "dateUpdated": "2025-01-28T15:55:54.421Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-12944 (GCVE-0-2020-12944)
Vulnerability from cvelistv5
Published
2021-11-16 18:17
Modified
2024-09-16 17:04
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- tbd
Summary
Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ Series |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T12:11:18.939Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Ryzen\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "product": "Athlon\u2122 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2022-05-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "tbd", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T15:27:11", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2022-05-10T20:00:00.000Z", "ID": "CVE-2020-12944", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Ryzen\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } }, { "product_name": "Athlon\u2122 Series", "version": { "version_data": [ { "version_affected": "=", "version_value": "various" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of BIOS image length by ASP Firmware could lead to arbitrary code execution." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "tbd" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ] }, "source": { "advisory": "AMD-SB-1027", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2020-12944", "datePublished": "2021-11-16T18:17:24.768272Z", "dateReserved": "2020-05-15T00:00:00", "dateUpdated": "2024-09-16T17:04:09.696Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26398 (GCVE-0-2021-26398)
Vulnerability from cvelistv5
Published
2023-01-10 20:56
Modified
2025-04-09 14:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen EPYC |
Version: various |
|||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.878Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26398", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T14:37:21.765798Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-787", "description": "CWE-787 Out-of-bounds Write", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T14:38:06.009Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA ", "platforms": [ "x86" ], "product": "1st Gen EPYC ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.\u003cbr\u003e\u003cbr\u003e" } ], "value": "Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.\n\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26398", "datePublished": "2023-01-10T20:56:40.452Z", "dateReserved": "2021-01-29T21:24:26.167Z", "dateUpdated": "2025-04-09T14:38:06.009Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20531 (GCVE-0-2023-20531)
Vulnerability from cvelistv5
Published
2023-01-10 20:57
Modified
2025-04-07 18:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen EPYC |
Version: various |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.887Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20531", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-07T15:56:38.825466Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-07T18:33:55.600Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.\u003cbr\u003e" } ], "value": "Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.\n" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20531", "datePublished": "2023-01-10T20:57:07.471Z", "dateReserved": "2022-10-27T18:53:39.739Z", "dateUpdated": "2025-04-07T18:33:55.600Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20569 (GCVE-0-2023-20569)
Vulnerability from cvelistv5
Published
2023-08-08 17:02
Modified
2024-09-23 03:18
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen™ 3000 Series Desktop Processors |
Version: various |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-09-23T03:18:32.598Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7005.html" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005" }, { "tags": [ "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-434.html" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4" }, { "tags": [ "x_transferred" ], "url": "https://comsec.ethz.ch/research/microarch/inception/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "tags": [ "x_transferred" ], "url": "https://www.debian.org/security/2023/dsa-5475" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240605-0006/" } ], "title": "CVE Program Container", "x_generator": { "engine": "ADPogram 0.0.1" } } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 3000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 3000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 4000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 4000 Series Desktop Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processors ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Desktop Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 5000 Series Desktop Processors", "vendor": " ", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 2000 Series Processors ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": " Ryzen\u2122 Threadripper\u2122 5000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 Threadripper\u2122 3000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Athlon\u2122 3000 Series Mobile Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 5000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 5000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 6000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 PRO 6000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "Ryzen\u2122 7040 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "Ryzen\u2122 7000 Series Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "Ryzen\u2122 7000 Series Processors with Radeon\u2122 Graphics", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": " 1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD ", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-08-08T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA side channel vulnerability on some \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eof the \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAMD CPUs may allow an attacker to influence \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ethe \u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ereturn address prediction\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. This may\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e result in speculative execution at an attacker-controlled\u202f\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eaddress\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e, potentially leading to information disclosure.\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "value": "\n\n\nA side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled\u202faddress, potentially leading to information disclosure.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-08-08T17:02:11.318Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7005" }, { "url": "http://xenbits.xen.org/xsa/advisory-434.html" }, { "url": "http://www.openwall.com/lists/oss-security/2023/08/08/4" }, { "url": "https://comsec.ethz.ch/research/microarch/inception/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4E4TZNMLYL2KETY23IPA43QXFAVJ46V/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKK3IA63LSKM4EC3TN4UM6DDEIOWEQIG/" }, { "url": "https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html" }, { "url": "https://www.debian.org/security/2023/dsa-5475" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/" }, { "url": "https://security.netapp.com/advisory/ntap-20240605-0006/" } ], "source": { "advisory": "AMD-SB-7005", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20569", "datePublished": "2023-08-08T17:02:11.318Z", "dateReserved": "2022-10-27T18:53:39.754Z", "dateUpdated": "2024-09-23T03:18:32.598Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26345 (GCVE-0-2021-26345)
Vulnerability from cvelistv5
Published
2023-11-14 18:53
Modified
2024-08-03 20:26
Severity ?
VLAI Severity ?
EPSS score ?
Summary
Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | ||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 2nd Gen AMD EPYC™ Processors |
Version: various |
|||||||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:26:24.909Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "tags": [ "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "packageName": "PI", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7002", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] }, { "defaultStatus": "unaffected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various" } ] } ], "datePublic": "2023-11-14T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.\n\n\n\n\n\n\n\n\n\n\n\n\u003cbr\u003e" } ], "value": "Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 1.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-18T18:38:22.990Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "source": { "advisory": "AMD-SB-3002, AMD-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26345", "datePublished": "2023-11-14T18:53:20.979Z", "dateReserved": "2021-01-29T21:24:26.145Z", "dateUpdated": "2024-08-03T20:26:24.909Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2023-20575 (GCVE-0-2023-20575)
Vulnerability from cvelistv5
Published
2023-07-11 18:29
Modified
2024-11-27 16:01
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 1st Gen AMD EPYC™ Processors |
Version: various |
||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:36.892Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2023-20575", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-11-27T15:57:15.725721Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-203", "description": "CWE-203 Observable Discrepancy", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-27T16:01:14.610Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "1st Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "2nd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "affected", "packageName": " ", "platforms": [ "x86" ], "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "platforms": [ "x86" ], "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] } ], "datePublic": "2023-07-11T16:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\n\n\u003cspan style=\"background-color: rgb(248, 249, 250);\"\u003eA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\u003c/span\u003e\n\n\n\n\n\n\n\n\n\n" } ], "value": "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n" } ], "providerMetadata": { "dateUpdated": "2023-07-11T18:29:02.607Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" } ], "source": { "advisory": "AMD-SB-3004", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2023-20575", "datePublished": "2023-07-11T18:29:02.607Z", "dateReserved": "2022-10-27T18:53:39.756Z", "dateUpdated": "2024-11-27T16:01:14.610Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-21978 (GCVE-0-2024-21978)
Vulnerability from cvelistv5
Published
2024-08-05 16:05
Modified
2024-08-05 17:36
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | 3rd Gen AMD EPYC™ Processors |
Version: various |
||||||||||||||||
|
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7003_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.9_sp3", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_9003_firmware:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9003_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.7_sp5", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_7203_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7203p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7303p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7643p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7663p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_7773x_firmware", "vendor": "amd", "versions": [ { "lessThan": "milanpi_1.0.0.d", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:o:amd:epyc_8024p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8024pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8124pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8224pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8324pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8434pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_8534pn_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "epyc_9754s_firmware", "vendor": "amd", "versions": [ { "lessThan": "genoapi_1.0.0.c", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-21978", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-05T17:01:18.171419Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-05T17:36:02.731Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "3rd Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI 1.0.0.D", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "4th Gen AMD EPYC\u2122 Processors", "vendor": "AMD", "versions": [ { "lessThan": "GenoaPI 1.0.0.C", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 7003", "vendor": "AMD", "versions": [ { "lessThan": "EmbMilanPI-SP3 1.0.0.9", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] }, { "defaultStatus": "affected", "product": "AMD EPYC\u2122 Embedded 9003", "vendor": "AMD", "versions": [ { "lessThan": "EmbGenoaPI-SP5 1.0.0.7", "status": "affected", "version": "various", "versionType": "Platform Initialization" } ] } ], "datePublic": "2024-08-05T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\n\n\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eImproper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.\u003c/span\u003e\n\n\u003c/span\u003e\n\n\u003c/span\u003e" } ], "value": "Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-08-05T16:05:34.019Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3011.html" } ], "source": { "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2024-21978", "datePublished": "2024-08-05T16:05:34.019Z", "dateReserved": "2024-01-03T16:43:30.197Z", "dateUpdated": "2024-08-05T17:36:02.731Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26316 (GCVE-0-2021-26316)
Vulnerability from cvelistv5
Published
2023-01-10 19:46
Modified
2025-04-09 15:19
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | |||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
► | AMD | Ryzen 5000 Series |
Version: various |
||||||||||||||||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.402Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" }, { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "title": "CVE Program Container" }, { "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2021-26316", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-04-09T15:18:38.823141Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-09T15:19:17.090Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "affected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 5000 Series ", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 2000 Series", "vendor": " AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "Ryzen 3000 Series", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA ", "platforms": [ "x86" ], "product": "1st Gen EPYC ", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "2nd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "Various " } ] }, { "defaultStatus": "unaffected", "packageName": "AGESA", "platforms": [ "x86" ], "product": "3rd Gen EPYC", "vendor": "AMD", "versions": [ { "status": "affected", "version": "various " } ] } ], "datePublic": "2023-01-10T17:30:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution." } ], "value": "Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2023-01-11T07:01:59.843Z", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1031" }, { "tags": [ "vendor-advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "source": { "advisory": "AMD-SB-1031, AMD-SB-1032", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26316", "datePublished": "2023-01-10T19:46:46.575Z", "dateReserved": "2021-01-29T21:24:26.137Z", "dateUpdated": "2025-04-09T15:19:17.090Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26325 (GCVE-0-2021-26325)
Vulnerability from cvelistv5
Published
2021-11-16 18:23
Modified
2024-09-16 16:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.230Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:23:15", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26325", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26325", "datePublished": "2021-11-16T18:23:15.960316Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-16T16:28:08.526Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-26327 (GCVE-0-2021-26327)
Vulnerability from cvelistv5
Published
2021-11-16 18:18
Modified
2024-09-17 02:42
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.
References
► | URL | Tags |
---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
AMD | 3rd Gen AMD EPYC™ |
Version: unspecified < MilanPI-SP3_1.0.0.4 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T20:19:20.137Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "3rd Gen AMD EPYC\u2122", "vendor": "AMD", "versions": [ { "lessThan": "MilanPI-SP3_1.0.0.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "datePublic": "2021-11-09T00:00:00", "descriptions": [ { "lang": "en", "value": "Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-11-16T18:18:25", "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "shortName": "AMD" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@amd.com", "DATE_PUBLIC": "2021-11-09T20:00:00.000Z", "ID": "CVE-2021-26327", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "3rd Gen AMD EPYC\u2122", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "MilanPI-SP3_1.0.0.4" } ] } } ] }, "vendor_name": "AMD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-20 Improper Input Validation" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021", "refsource": "MISC", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ] }, "source": { "advisory": "AMD-SB-1021", "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648", "assignerShortName": "AMD", "cveId": "CVE-2021-26327", "datePublished": "2021-11-16T18:18:25.899504Z", "dateReserved": "2021-01-29T00:00:00", "dateUpdated": "2024-09-17T02:42:07.509Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution." }, { "lang": "es", "value": "AMD System Management Unit (SMU) contiene un problema potencial en el que un usuario malicioso puede ser capaz de manipular las entradas del buz\u00f3n de correo, conllevando a una ejecuci\u00f3n de c\u00f3digo arbitrario" } ], "id": "CVE-2021-26331", "lastModified": "2024-11-21T05:56:07.273", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.197", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-12-10 22:15
Modified
2024-11-21 05:56
Severity ?
Summary
A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_73f3_firmware | - | |
amd | epyc_73f3 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7453_firmware | - | |
amd | epyc_7453 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | epyc_embedded_3101_firmware | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151_firmware | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201_firmware | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251_firmware | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255_firmware | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3351_firmware | - | |
amd | epyc_embedded_3351 | - | |
amd | epyc_embedded_3451_firmware | - | |
amd | epyc_embedded_3451 | - | |
amd | epyc_embedded_7601_firmware | - | |
amd | epyc_embedded_7601 | - | |
amd | epyc_embedded_7551_firmware | - | |
amd | epyc_embedded_7551 | - | |
amd | epyc_embedded_7501_firmware | - | |
amd | epyc_embedded_7501 | - | |
amd | epyc_embedded_7451_firmware | - | |
amd | epyc_embedded_7451 | - | |
amd | epyc_embedded_7401_firmware | - | |
amd | epyc_embedded_7401 | - | |
amd | epyc_embedded_7371_firmware | - | |
amd | epyc_embedded_7371 | - | |
amd | epyc_embedded_7351_firmware | - | |
amd | epyc_embedded_7351 | - | |
amd | epyc_embedded_7301_firmware | - | |
amd | epyc_embedded_7301 | - | |
amd | epyc_embedded_7281_firmware | - | |
amd | epyc_embedded_7281 | - | |
amd | epyc_embedded_7261_firmware | - | |
amd | epyc_embedded_7261 | - | |
amd | epyc_embedded_7251_firmware | - | |
amd | epyc_embedded_7251 | - | |
amd | epyc_embedded_755p_firmware | - | |
amd | epyc_embedded_755p | - | |
amd | epyc_embedded_740p_firmware | - | |
amd | epyc_embedded_740p | - | |
amd | epyc_embedded_735p_firmware | - | |
amd | epyc_embedded_735p | - | |
amd | epyc_embedded_7h12_firmware | - | |
amd | epyc_embedded_7h12 | - | |
amd | epyc_embedded_7742_firmware | - | |
amd | epyc_embedded_7742 | - | |
amd | epyc_embedded_7702_firmware | - | |
amd | epyc_embedded_7702 | - | |
amd | epyc_embedded_7662_firmware | - | |
amd | epyc_embedded_7662 | - | |
amd | epyc_embedded_7642_firmware | - | |
amd | epyc_embedded_7642 | - | |
amd | epyc_embedded_7552_firmware | - | |
amd | epyc_embedded_7552 | - | |
amd | epyc_embedded_7542_firmware | - | |
amd | epyc_embedded_7542 | - | |
amd | epyc_embedded_7532_firmware | - | |
amd | epyc_embedded_7532 | - | |
amd | epyc_embedded_7502_firmware | - | |
amd | epyc_embedded_7502 | - | |
amd | epyc_embedded_7452_firmware | - | |
amd | epyc_embedded_7452 | - | |
amd | epyc_embedded_7f72_firmware | - | |
amd | epyc_embedded_7f72 | - | |
amd | epyc_embedded_7402_firmware | - | |
amd | epyc_embedded_7402 | - | |
amd | epyc_embedded_7352_firmware | - | |
amd | epyc_embedded_7352 | - | |
amd | epyc_embedded_7f52_firmware | - | |
amd | epyc_embedded_7f52 | - | |
amd | epyc_embedded_7302_firmware | - | |
amd | epyc_embedded_7302 | - | |
amd | epyc_embedded_7282_firmware | - | |
amd | epyc_embedded_7282 | - | |
amd | epyc_embedded_7272_firmware | - | |
amd | epyc_embedded_7272 | - | |
amd | epyc_embedded_7f32_firmware | - | |
amd | epyc_embedded_7f32 | - | |
amd | epyc_embedded_7262_firmware | - | |
amd | epyc_embedded_7262 | - | |
amd | epyc_embedded_7252_firmware | - | |
amd | epyc_embedded_7252 | - | |
amd | epyc_embedded_7702p_firmware | - | |
amd | epyc_embedded_7702p | - | |
amd | epyc_embedded_7502p_firmware | - | |
amd | epyc_embedded_7502p | - | |
amd | epyc_embedded_7402p_firmware | - | |
amd | epyc_embedded_7402p | - | |
amd | epyc_embedded_7302p_firmware | - | |
amd | epyc_embedded_7302p | - | |
amd | epyc_embedded_7232p_firmware | - | |
amd | epyc_embedded_7232p | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896B4BEE-C14D-4C07-8757-32753F97B00A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC4AB744-D25D-4957-A59C-88D2DC58C80C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "52F05DED-9EF9-4EA3-AD5A-82A7910A707B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "450B1070-7EB3-4CA9-BAE0-A5F1BC8D496F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "D334BA0B-BB66-4358-BA90-FE23517545EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "05CD71FC-AB6D-47E9-9218-C91A234B9C24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE8E000-C771-4DB1-94CE-074F5B93D37D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4DC937-0674-42F7-A1D1-F7E863B53A91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D080645-4D40-4ED2-B232-924C9C54594C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "070BCADE-6B21-4A23-98EB-8066FFFAE669", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB985DC-B05A-4443-89EA-426D7E49EE64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD0DC74-61B3-41FC-989E-ED9C35DEE2F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED8BA8B1-07F1-49D8-8E42-A5DDA10C65CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA09BAA0-05FB-4B9F-AAAE-043D2E0D5AD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C806BA9-5B49-4791-8106-98AD2B6CE9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1963446-5D43-410C-9092-0AEC9B4A0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "157807C6-68D3-4C38-92E0-8711B2E27E6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8207292-897B-4CF3-ADF1-7315BF1685DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B38FFE-9F43-4256-9ADC-B26C6AE8EAA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17975952-3089-41A0-8749-02C38C1AAAC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD5DA99-B62A-4D07-B772-23F74F7E6A9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBA5C26B-5987-4DFB-B170-28AB69FDAF4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EE075-60D9-4040-B92C-F9AC4CA2E45A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28ED6E82-E504-4B2F-9461-08CA7EAABDBD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_755p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E7620BA-725F-4FAE-A8F8-E86B68DAB70F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E11EAA0-926A-462D-B9C9-9FDC004570DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_740p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51B59724-FCCB-4FDA-93CA-8B34E05B605D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCEBE07C-D070-4F55-8068-F3C7C3D8463C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_735p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D5358B3-A3A5-4DCD-A637-A7FCF9E9294D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4524C883-B83C-4725-B7B7-D2EAA5A8CA68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1295268-EEF3-4729-AB5A-92FB1A54DDCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6E2984-0D6C-4AF1-B804-318C9B0E25BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5520E3-2CE4-4603-9B88-C87B0E8BFFC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADF2869-5A22-41B8-BA4A-983D458924AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "E79AEAF0-BD56-4B32-B751-8BF0B77EB35F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0499FC7A-B25F-4108-A226-7CFA88147025", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E519255-1852-4E8B-8CB0-923C84A042AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBDD2A07-6611-4E66-9C50-02690CEE7CC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "405516F0-0CFD-463C-9CD7-BD3DA8C1FAFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C467DCF-8532-48BC-A6FC-BE4630C1E591", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "2899555F-1866-4C31-AC42-C53F4FA34205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14EC642-6373-4FF3-B9F1-659DBBC9057F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "4451C723-AB17-4808-981A-DA8DA9F00F4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A57A1A-5801-4B5D-8B5A-3805A3453A70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "03CB40D5-9553-45EE-8E2C-AD0FE2856D74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8947D6DD-A667-4ED6-9376-599D753B6233", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAEF5FCC-916A-4157-862D-F535187BB51D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A14CDA-3C70-4E7A-B443-DA80054F3772", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB6267A-94F9-4048-B7B8-A49DE90A92DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B2C9C9-A3D9-4466-B2A4-C8C7327920A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB940A6-42F3-4655-BFE9-F8781501D791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534FC224-188B-42FB-9E77-F88C1068CD14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6EA803F-13EC-4D52-8AA6-F841DC734445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD74D15-0FCD-47DC-B98B-C17358C9C396", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BBCDA30-F49D-4692-A995-5F4D2B7EC9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8623221-FED4-4F28-B179-A0F1D5E177FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "049EEAD5-8CDA-46C3-B904-4DF6304ECC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0132EA29-B3C2-40EE-9742-54803CF2076A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB4C7513-0B72-4737-9636-C796BFBAE8A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF95FF8-2E24-4F11-95A1-413D71BA28A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FDAD440-8EF5-4484-A558-EBC5B38E51A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79011066-90A2-4A2E-9267-B8F318C0F32E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "869DD653-40EB-4DBC-97FA-F3FD45F91147", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE40EA-AD62-4053-9EB8-1A79D80ABB76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E050ADA0-554E-4565-8F9E-12E7428821C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "393DAE4B-39F4-4E43-B422-0620013426BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3450FF5-4741-443B-8D63-90C6D8B798A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF23E7EB-C4BB-42F5-AE8E-6E9F6D2265A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A18E7E3-F614-4A73-A270-042D887D49DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929C8058-491D-400F-88E9-3639269AAC41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E15528-03C0-457B-8720-7C9AC94A4413", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EB0E55-3622-4022-A987-31D0423F0D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "500FC809-D29D-4A8D-8DBC-943788FDE017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4931C9D0-F5A0-4EE3-843A-A5529351DBFF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1ACE7E0-F73E-4700-A64D-A65AF8A8D585", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73B2E-4D67-45E3-B2AE-BD50261CD128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "693C9380-D732-4ED2-98AD-B326C6D51715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "124C4B7F-BC05-4B65-89D4-935760AD87AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "852C88A6-5381-4D0A-B81A-D567078A6AFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM)." }, { "lang": "es", "value": "Un Hypervisor malicioso en conjunci\u00f3n con un proceso de atacante no privilegiado dentro de una m\u00e1quina virtual invitada SEV/SEV-ES puede producir un fallo en el vaciado de la Memoria Intermedia de Traducci\u00f3n (TLB), resultando en un comportamiento no esperado dentro de la m\u00e1quina virtual (VM)" } ], "id": "CVE-2021-26340", "lastModified": "2024-11-21T05:56:08.917", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-12-10T22:15:08.323", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-02-13 20:15
Modified
2025-03-20 21:15
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
Summary
Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7DC71137-5861-4413-AE37-FBA5EA15CD84", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BB947EC3-B3CF-4E35-86C1-DDD831D4518D", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6FB9F211-8998-44FF-91FE-723BA6315B85", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3A4256B-4211-4A15-B33C-743A4898CB76", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DCADA15-DE56-4993-977D-5BE701476D46", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1063F18B-600E-46FB-B6DA-95C8D4C32ACD", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FF7D4F3A-CE7A-4C84-B872-E1206912AD62", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E5D9E427-F642-4EA3-9213-616D4FC5BFCE", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFEA67F1-83B8-461D-8066-91BBD3FD9E24", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B86A8C8F-BEFC-439B-A712-E931CC229708", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "21ED479B-BDA8-4DB2-81C6-F0D6576C2C95", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6651DED0-FD67-406B-845A-553ABBBCCB02", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "025B7A4B-0CF9-401E-AF18-3581CD04BDB5", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32AB0DD3-0FDA-4D70-9EB2-F1A03B5B6D92", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F64D3037-AC84-411D-AF23-2B6E49C26896", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AFE24E16-5219-4DF1-9722-BCB9B5BEFAC4", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA1D5CD3-8E14-4E55-8D7C-10E8DBCA6418", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBC1FE8-F91B-407A-B4DC-C3EE38676828", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00B84AD1-3F32-46B5-88D1-50CE43844977", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10654574-BACF-41D7-8B2D-73E2E0CBFBFB", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCC29525-306B-4E29-A846-8439487042D6", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77DA95C1-908B-4AAA-88AD-6D3AA1E4DCE0", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6EC6AF23-8DE0-4402-B707-F9DC3E83B906", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C45FD0CE-4B69-4C95-9EA1-575736A55045", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C2B77A7-357B-4F13-83B9-BB45EB2C1F4A", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E6EEB19-3507-439B-912F-C19D3E8D9A96", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AEDA7A65-34F0-454C-9040-A7024DB82D6C", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A71852A5-4EBF-4127-B36D-53B113F3CFA3", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32A17247-5FFB-4293-805F-37A2FDE25141", "versionEndExcluding": "milanpi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4046AE4-F5D5-4B82-9E58-5970575E9908", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98F5728-3653-4F17-804A-B658C1195033", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "030095CD-24D9-4033-A0C5-74C55083726D", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7138757-214C-44E2-9873-9F00EAAFFBA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4299D7-608D-4628-A8FE-DC0DBC09670F", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A25A14B0-641D-4EAE-93C8-2ED73698BA70", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7978A2-777E-45D1-8036-7A4A72750AD8", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08631494-65FE-4052-A572-AAA959DDC4A7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2552E1CD-3D25-4A86-B435-8A2A4223AE35", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1A672DC-A7F4-4115-907C-89570F552582", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "865C7A18-D151-4DEA-9279-6EE21CA02EBC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCDF1C52-B820-4F82-9E24-F460180D06F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F55ED1-AA9B-476E-AE54-630E8B28911A", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "608CCBAB-A934-4989-82BE-25042F0E5A57", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA2412-28EC-4589-9B3F-78F451EF2048", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDCABE02-1723-4859-B863-805A7C37014B", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CECE4403-4C94-4CF0-983C-76720122738E", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B20E51-60E2-4309-A6F2-3F3F1F22B325", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Failure to initialize\nmemory in SEV Firmware may allow a privileged attacker to access stale data\nfrom other guests.\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" }, { "lang": "es", "value": "No inicializar la memoria en el firmware SEV puede permitir que un atacante privilegiado acceda a datos obsoletos de otros invitados." } ], "id": "CVE-2023-31346", "lastModified": "2025-03-20T21:15:19.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-02-13T20:15:52.737", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-284" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-07 19:15
Severity ?
2.4 (Low) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2.4 (Low) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
2.4 (Low) - CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
Summary
Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente en la SMU puede permitir que un atacante f\u00edsico extraiga el contenido de la memoria de la SMU a trav\u00e9s del bus I2C, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad." } ], "id": "CVE-2023-20528", "lastModified": "2025-04-07T19:15:47.787", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 2.4, "baseSeverity": "LOW", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-11T08:15:13.847", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 18:15
Modified
2024-11-21 05:56
Severity ?
Summary
Persistent platform private key may not be protected with a random IV leading to a potential “two time pad attack”.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Persistent platform private key may not be protected with a random IV leading to a potential \u201ctwo time pad attack\u201d." }, { "lang": "es", "value": "La clave privada de la plataforma persistente puede no estar protegida con un IV aleatorio, conllevando a un potencial \"two time pad attack\"" } ], "id": "CVE-2021-26322", "lastModified": "2024-11-21T05:56:05.790", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T18:15:07.230", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-320" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-330" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification." }, { "lang": "es", "value": "Un efecto secundario de una opci\u00f3n integrada en el chipset puede ser usado por un atacante para omitir las protecciones de la ROM SPI, permitiendo la modificaci\u00f3n no autorizada de la ROM SPI" } ], "id": "CVE-2020-12954", "lastModified": "2024-11-21T05:00:34.953", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.480", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2025-01-28 16:15
Severity ?
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
7.4 (High) - CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
Summary
A TOCTOU in ASP bootloader may allow an attacker
to tamper with the SPI ROM following data read to memory potentially resulting
in S3 data corruption and information disclosure.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3950xt_firmware | - | |
amd | ryzen_9_3950xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_3700xt_firmware | - | |
amd | ryzen_7_3700xt | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | * | |
amd | ryzen_9_5900 | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | * | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4BD7B00D-ECD9-419E-B927-7AD293360BB3", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1053118D-84FB-4126-8558-F731AF578D51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "10630C1F-3EAE-47EE-AD1C-6C35052B1C51", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "214D44A0-2B4F-4C3B-BC77-3388F60BEE21", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "91DC33A9-7EE5-443F-A195-5739E25880D8", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E196A8EC-8E17-4394-BBB9-AAC4B773686A", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2F2D9898-5A45-4F76-89F9-A0E0F9B68195", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6554840-DD72-4CB7-B72B-40F0EB4AAB5D", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EB8E56A-20CD-4722-91F8-A4BC9E629F84", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "17C9FDD3-74A4-4848-B6CE-7861658C3A30", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "264D28A9-A104-4333-9094-8251FBF00880", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02967552-68C0-4111-B05D-BC17EFEF37DD", "versionEndExcluding": "naplespi_1.0.0.h", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289EC897-401C-4C91-8C1F-7CB5E034FE4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1EE7BD8-625F-4533-AF43-213A82FCB1FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "86A33632-EAAF-4ADF-B07D-CDC9385ED732", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CC7E22A-C19C-48FC-AE86-A68473B8602E", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C49E756-5618-4D8E-81C1-33CD3BC353D6", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B4EED49-0DED-45EC-877D-672BBB06BCA7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B05A06A-CA4D-4913-B882-4E56B2432D59", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1FA8962-C0BC-4493-AB01-1D0936CE8E1D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CA0144F-9D9B-4DC1-AE54-B6AC77430900", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "75273AB0-F8E2-47D6-8C57-BED9644C780B", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E8E54262-7072-476B-9350-F346245E1201", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "170E0360-4016-4701-A122-04E7D52A2230", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E4C3A17-1330-4715-895C-E504B69CE9CF", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B6A231C-DB49-4579-ADC6-4C1BF1070E8F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F14E7796-C881-4C3D-9B73-3ADF0F3DDE52", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C323A487-AA20-4BDC-93BE-605030A6605F", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517C9C4-90C3-4B37-B47E-C9B28EE604FD", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0F738BC-5F96-4B78-911F-163EDDCB54D7", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E3AD05-0284-4C33-BD07-95B30D1CB018", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A44438AB-41BB-4E25-AD79-729857CF8B4D", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25AFCF12-4CE4-4D1B-80F4-FD90C19984EE", "versionEndExcluding": "romepi_1.0.0.d", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33C33F27-AEBC-4DD4-8262-FE025253AE97", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E39BD43-7D5D-4210-9C7F-864F683145DA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6288EE79-3403-44A8-9235-69BA199A6030", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "051172C8-F9BA-411F-A493-7A7733C112C8", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AEA61A0-B5F7-4686-8512-EC0384D3834B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A5C00A-1E67-42D8-8308-2B3BB4C890F1", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C8EE809F-B0F8-45BF-B09B-300B2BF19D80", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9ED4A553-FAD0-4586-9028-BC31DE44ABE6", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705F826C-F5DA-4803-9104-45B1F3E3CC86", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E0076C0-C3E2-4E85-9D48-CAA83AFA7E0B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E14DB62-5BDB-4C06-B55E-E579BCEF1449", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C924FDA-8806-4CB7-97D4-E014E56E5463", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C48B708-BEB1-41AC-8B2E-9DA04C214CBB", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FF41C57-7BEF-4A89-8A75-6F8247885792", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A3021490-D6A4-423F-B87A-9995CD6BDEA5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "518A109A-1776-40F0-A8DF-B7C971EFB633", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F89D442C-0E87-4C0E-A2ED-194C5C42D4A5", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A11965EE-3867-4846-B714-79F1D2681AAA", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BE9015F-CE32-41E7-88CD-2057AACA3D98", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CDC3E24-8F3C-4A6C-849B-52C8240EAE27", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4E099CD-49DA-44B6-8DA7-C39502321D2B", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C88C305-88AA-4B54-ADA2-A13202157163", "versionEndExcluding": "milanpi_1.0.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FBF8C2-C17C-4688-AF07-CBCF22A86879", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "578B531F-3884-4F0A-AE99-9F5F3D3267A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A630AE54-9E40-4ABB-81DC-35D423785C44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "E772D4F6-B0AD-490F-BAF0-DADD3C8F5295", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EB03625-1A44-46CF-BEE4-B9753A2067AD", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DDE971D-6762-4D3F-B574-6839D195BB6B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B018068-116B-4662-AB36-849F934F1AE7", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E392A7-AEC8-4F8C-8761-1247CB1A0B23", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8985C782-787C-4B7E-8C0F-033654D84764", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4012629D-3D3F-48ED-88A5-9F2CB44914F9", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD8CE65-F4DB-4D0B-8A49-6161E201F791", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65DE69E3-AE8A-42F9-897D-0950E7D074D0", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE7618FD-A6A5-4DA6-93AE-253C8162F97F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98A4202-BDB2-4ED4-97AD-9048F3B8B08E", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A TOCTOU in ASP bootloader may allow an attacker\nto tamper with the SPI ROM following data read to memory potentially resulting\nin S3 data corruption and information disclosure.\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-26356", "lastModified": "2025-01-28T16:15:29.150", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 5.2, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-09T19:15:10.737", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-367" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-10 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBBDB4C7-ACE7-4E2C-AEB7-43A43D6EDA02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3E2E06DC-6338-4D73-A7F4-C004CBAC7D02", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5E32897E-6D86-4C74-ABB7-05844A1E7CA2", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "84179B6A-5F03-4F90-A8B5-730BBBD09CDA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs." }, { "lang": "es", "value": "Un error en el TMR de SEV-ES podr\u00eda conllevar a una potencial p\u00e9rdida de integridad de la memoria para las VMs activas en SNP" } ], "id": "CVE-2021-26324", "lastModified": "2024-11-21T05:56:06.107", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-10T19:15:07.857", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of the AMD SEV Signing Key (ASK) in the SEND_START command in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP" }, { "lang": "es", "value": "Una comprobaci\u00f3n insuficiente de la clave de firma de AMD SEV (ASK) en el comando SEND_START en el firmware de SEV puede permitir a un atacante local autenticado llevar a cabo una denegaci\u00f3n de servicio de la PSP" } ], "id": "CVE-2021-26320", "lastModified": "2024-11-21T05:56:05.443", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.750", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-295" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-04 23:15
Modified
2024-11-21 05:00
Severity ?
Summary
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@amd.com | http://www.openwall.com/lists/oss-security/2022/08/08/6 | Mailing List, Third Party Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/08/08/6 | Mailing List, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013 | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7002_firmware | - | |
amd | epyc_7002 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | epyc_embedded_3101_firmware | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151_firmware | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201_firmware | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251_firmware | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255_firmware | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3351_firmware | - | |
amd | epyc_embedded_3351 | - | |
amd | epyc_embedded_3451_firmware | - | |
amd | epyc_embedded_3451 | - | |
amd | epyc_embedded_7232p_firmware | - | |
amd | epyc_embedded_7232p | - | |
amd | epyc_embedded_7251_firmware | - | |
amd | epyc_embedded_7251 | - | |
amd | epyc_embedded_7252_firmware | - | |
amd | epyc_embedded_7252 | - | |
amd | epyc_embedded_7261_firmware | - | |
amd | epyc_embedded_7261 | - | |
amd | epyc_embedded_7262_firmware | - | |
amd | epyc_embedded_7262 | - | |
amd | epyc_embedded_7272_firmware | - | |
amd | epyc_embedded_7272 | - | |
amd | epyc_embedded_7281_firmware | - | |
amd | epyc_embedded_7281 | - | |
amd | epyc_embedded_7282_firmware | - | |
amd | epyc_embedded_7282 | - | |
amd | epyc_embedded_7301_firmware | - | |
amd | epyc_embedded_7301 | - | |
amd | epyc_embedded_7302_firmware | - | |
amd | epyc_embedded_7302 | - | |
amd | epyc_embedded_7302p_firmware | - | |
amd | epyc_embedded_7302p | - | |
amd | epyc_embedded_7351_firmware | - | |
amd | epyc_embedded_7351 | - | |
amd | epyc_embedded_7352_firmware | - | |
amd | epyc_embedded_7352 | - | |
amd | epyc_embedded_735p_firmware | - | |
amd | epyc_embedded_735p | - | |
amd | epyc_embedded_7371_firmware | - | |
amd | epyc_embedded_7371 | - | |
amd | epyc_embedded_7401_firmware | - | |
amd | epyc_embedded_7401 | - | |
amd | epyc_embedded_7402_firmware | - | |
amd | epyc_embedded_7402 | - | |
amd | epyc_embedded_7402p_firmware | - | |
amd | epyc_embedded_7402p | - | |
amd | epyc_embedded_740p_firmware | - | |
amd | epyc_embedded_740p | - | |
amd | epyc_embedded_7451_firmware | - | |
amd | epyc_embedded_7451 | - | |
amd | epyc_embedded_7452_firmware | - | |
amd | epyc_embedded_7452 | - | |
amd | epyc_embedded_7501_firmware | - | |
amd | epyc_embedded_7501 | - | |
amd | epyc_embedded_7502_firmware | - | |
amd | epyc_embedded_7502 | - | |
amd | epyc_embedded_7502p_firmware | - | |
amd | epyc_embedded_7502p | - | |
amd | epyc_embedded_7532_firmware | - | |
amd | epyc_embedded_7532 | - | |
amd | epyc_embedded_7542_firmware | - | |
amd | epyc_embedded_7542 | - | |
amd | epyc_embedded_7551_firmware | - | |
amd | epyc_embedded_7551 | - | |
amd | epyc_embedded_7552_firmware | - | |
amd | epyc_embedded_7552 | - | |
amd | epyc_embedded_755p_firmware | - | |
amd | epyc_embedded_755p | - | |
amd | epyc_embedded_7601_firmware | - | |
amd | epyc_embedded_7601 | - | |
amd | epyc_embedded_7642_firmware | - | |
amd | epyc_embedded_7642 | - | |
amd | epyc_embedded_7662_firmware | - | |
amd | epyc_embedded_7662 | - | |
amd | epyc_embedded_7702_firmware | - | |
amd | epyc_embedded_7702 | - | |
amd | epyc_embedded_7702p_firmware | - | |
amd | epyc_embedded_7702p | - | |
amd | epyc_embedded_7742_firmware | - | |
amd | epyc_embedded_7742 | - | |
amd | epyc_embedded_7f32_firmware | - | |
amd | epyc_embedded_7f32 | - | |
amd | epyc_embedded_7f52_firmware | - | |
amd | epyc_embedded_7f52 | - | |
amd | epyc_embedded_7f72_firmware | - | |
amd | epyc_embedded_7f72 | - | |
amd | epyc_embedded_7h12_firmware | - | |
amd | epyc_embedded_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4510ACB-D9BA-4183-91B1-AF1367340DA7", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE5A25ED-132D-435E-BE53-9E4D551D5CCB", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4821B41-34B6-4D97-AF00-32767141140A", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "684CC73A-0866-478A-891C-2908EAFED8FA", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D1438B05-396D-46F1-AEEE-36676DFC3ADA", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3F832AEC-15B6-4065-8DB9-DF9BDD7365BE", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A238766-6B98-4586-8B79-12B6E41FA13A", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C86C6A31-D706-4511-A52C-AB8C836E82A9", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A054E461-03EA-4FCC-A526-CC2D46E11B4C", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "964582F8-0DBA-47BF-9D0E-D9CD15FDF137", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81AB437A-2576-498D-9FB8-A5D68DC038E3", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E34FFBF9-66DA-4C96-8D65-A3E754655E38", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBB6F9A9-8A82-41CF-8385-30F32AF61E5A", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "076D58C5-D447-4FF1-B8C6-326B5648AE11", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEF5A508-53BC-476F-BA58-C1EDC2E20DB7", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B452FCC-68D9-404C-90E0-B0978FD2E567", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B047325A-6FAF-451B-B3AF-AD3C620EFD88", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FEC88B1-F3F5-43E6-A07D-F56F1EC6DE01", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48597508-4968-415F-8601-7862CE96AF28", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C33F5E4F-38BF-4102-B8F3-0992CAB42095", "versionEndExcluding": "milanpi-sp3_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "896B4BEE-C14D-4C07-8757-32753F97B00A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3351:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3B6175-0366-473D-A82F-E3F1373C74F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "124C4B7F-BC05-4B65-89D4-935760AD87AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "852C88A6-5381-4D0A-B81A-D567078A6AFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBA5C26B-5987-4DFB-B170-28AB69FDAF4D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C5EE075-60D9-4040-B92C-F9AC4CA2E45A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF23E7EB-C4BB-42F5-AE8E-6E9F6D2265A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A18E7E3-F614-4A73-A270-042D887D49DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "17975952-3089-41A0-8749-02C38C1AAAC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD5DA99-B62A-4D07-B772-23F74F7E6A9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "393DAE4B-39F4-4E43-B422-0620013426BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3450FF5-4741-443B-8D63-90C6D8B798A3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79011066-90A2-4A2E-9267-B8F318C0F32E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "869DD653-40EB-4DBC-97FA-F3FD45F91147", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8207292-897B-4CF3-ADF1-7315BF1685DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8B38FFE-9F43-4256-9ADC-B26C6AE8EAA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF95FF8-2E24-4F11-95A1-413D71BA28A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FDAD440-8EF5-4484-A558-EBC5B38E51A2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1963446-5D43-410C-9092-0AEC9B4A0057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "157807C6-68D3-4C38-92E0-8711B2E27E6B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0132EA29-B3C2-40EE-9742-54803CF2076A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB4C7513-0B72-4737-9636-C796BFBAE8A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73B2E-4D67-45E3-B2AE-BD50261CD128", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "693C9380-D732-4ED2-98AD-B326C6D51715", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA09BAA0-05FB-4B9F-AAAE-043D2E0D5AD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C806BA9-5B49-4791-8106-98AD2B6CE9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD74D15-0FCD-47DC-B98B-C17358C9C396", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BBCDA30-F49D-4692-A995-5F4D2B7EC9D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_735p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCEBE07C-D070-4F55-8068-F3C7C3D8463C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_735p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D5358B3-A3A5-4DCD-A637-A7FCF9E9294D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD0DC74-61B3-41FC-989E-ED9C35DEE2F7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED8BA8B1-07F1-49D8-8E42-A5DDA10C65CD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "070BCADE-6B21-4A23-98EB-8066FFFAE669", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB985DC-B05A-4443-89EA-426D7E49EE64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "534FC224-188B-42FB-9E77-F88C1068CD14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6EA803F-13EC-4D52-8AA6-F841DC734445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4931C9D0-F5A0-4EE3-843A-A5529351DBFF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1ACE7E0-F73E-4700-A64D-A65AF8A8D585", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_740p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E11EAA0-926A-462D-B9C9-9FDC004570DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_740p:-:*:*:*:*:*:*:*", "matchCriteriaId": "51B59724-FCCB-4FDA-93CA-8B34E05B605D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E4DC937-0674-42F7-A1D1-F7E863B53A91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D080645-4D40-4ED2-B232-924C9C54594C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47A14CDA-3C70-4E7A-B443-DA80054F3772", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB6267A-94F9-4048-B7B8-A49DE90A92DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "05CD71FC-AB6D-47E9-9218-C91A234B9C24", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AE8E000-C771-4DB1-94CE-074F5B93D37D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8947D6DD-A667-4ED6-9376-599D753B6233", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAEF5FCC-916A-4157-862D-F535187BB51D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69EB0E55-3622-4022-A987-31D0423F0D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "500FC809-D29D-4A8D-8DBC-943788FDE017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2A57A1A-5801-4B5D-8B5A-3805A3453A70", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "03CB40D5-9553-45EE-8E2C-AD0FE2856D74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F14EC642-6373-4FF3-B9F1-659DBBC9057F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "4451C723-AB17-4808-981A-DA8DA9F00F4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "450B1070-7EB3-4CA9-BAE0-A5F1BC8D496F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "D334BA0B-BB66-4358-BA90-FE23517545EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C467DCF-8532-48BC-A6FC-BE4630C1E591", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "2899555F-1866-4C31-AC42-C53F4FA34205", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_755p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "28ED6E82-E504-4B2F-9461-08CA7EAABDBD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_755p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E7620BA-725F-4FAE-A8F8-E86B68DAB70F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC4AB744-D25D-4957-A59C-88D2DC58C80C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "52F05DED-9EF9-4EA3-AD5A-82A7910A707B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBDD2A07-6611-4E66-9C50-02690CEE7CC3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "405516F0-0CFD-463C-9CD7-BD3DA8C1FAFF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0499FC7A-B25F-4108-A226-7CFA88147025", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E519255-1852-4E8B-8CB0-923C84A042AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADF2869-5A22-41B8-BA4A-983D458924AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "E79AEAF0-BD56-4B32-B751-8BF0B77EB35F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929C8058-491D-400F-88E9-3639269AAC41", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "05E15528-03C0-457B-8720-7C9AC94A4413", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB6E2984-0D6C-4AF1-B804-318C9B0E25BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5520E3-2CE4-4603-9B88-C87B0E8BFFC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DEE40EA-AD62-4053-9EB8-1A79D80ABB76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E050ADA0-554E-4565-8F9E-12E7428821C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8623221-FED4-4F28-B179-A0F1D5E177FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "049EEAD5-8CDA-46C3-B904-4DF6304ECC74", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B2C9C9-A3D9-4466-B2A4-C8C7327920A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CB940A6-42F3-4655-BFE9-F8781501D791", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4524C883-B83C-4725-B7B7-D2EAA5A8CA68", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1295268-EEF3-4729-AB5A-92FB1A54DDCC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMD EPYC\u2122 Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor." }, { "lang": "es", "value": "Los procesadores AMD EPYC\u2122 contienen una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en la virtualizaci\u00f3n cifrada segura con estado cifrado (SEV-ES) y la virtualizaci\u00f3n cifrada segura con paginaci\u00f3n anidada segura (SEV-SNP). Un atacante local autenticado podr\u00eda potencialmente explotar esta vulnerabilidad conllevando a una filtraci\u00f3n de los datos del hu\u00e9sped por parte del hipervisor malicioso" } ], "id": "CVE-2020-12966", "lastModified": "2024-11-21T05:00:36.000", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-04T23:15:10.333", "references": [ { "source": "psirt@amd.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" }, { "source": "psirt@amd.com", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2022/08/08/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-08 21:15
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F43FE6B-1CE0-4C93-B457-385D60D0BC7E", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CED4A938-7B21-4DBE-945E-04FD76712CDD", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35BC64A9-A82B-4D1A-A070-541F429632FD", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2909C50-60B7-45A4-A597-B9B13A3136C6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5F5AAD-06AB-4AE2-ADDF-C704278B1E63", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B13FA57-6D07-4461-B40C-227977EFB67F", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45D2D3-EACD-40A7-A2E4-3E4918C1AAFE", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9BBB5C7-942A-4B1D-9219-7D158D6B65E3", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EA98910-C8B0-4449-A3AD-5C2356C917A8", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A92937F-8BB5-4D63-A589-58BF847F06CA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "80D9BAD4-AA85-45C6-9246-089D8C4FB30F", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB76635-870C-4304-B435-FFCD671FA882", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C0B8817-B424-4F8C-B6A0-8305C6317A65", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "661AC564-7A60-4E10-ADC3-964A04FBA896", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B7EB27B-1963-4057-9088-CBC6FBCD91F6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B8ED95C-4703-4C83-B787-096FB2730CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2499FB92-B422-4E92-960B-FB67B4C8108F", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69C1BF26-EE53-4D48-A4CB-FB04E3DE6697", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52B04F08-3447-4686-A965-65F8C7C64696", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F45D168-7370-454E-AA01-66A5F418AAFA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B612010-419B-4F5C-8B00-C5BCE6B20EE3", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "964257EB-311C-4323-AE2C-4BD97FB21798", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "816CE49A-4C18-4834-883B-2F19644C831D", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.\n" }, { "lang": "es", "value": "La validaci\u00f3n de entrada y la verificaci\u00f3n de los l\u00edmites inadecuadas en el firmware SEV pueden perder bytes del b\u00fafer temporal, lo que puede provocar una posible divulgaci\u00f3n de informaci\u00f3n." } ], "id": "CVE-2021-26404", "lastModified": "2025-04-08T21:15:43.733", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-11T08:15:11.647", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution." }, { "lang": "es", "value": "La comprobaci\u00f3n inadecuada de entradas y rangos en la cabecera de la imagen del cargador de arranque de AMD Secure Processor (ASP) puede permitir a un atacante utilizar valores controlados por \u00e9l antes de la validaci\u00f3n de la firma, lo que podr\u00eda dar lugar a la ejecuci\u00f3n de c\u00f3digo arbitrario" } ], "id": "CVE-2021-26335", "lastModified": "2024-11-21T05:56:07.863", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.260", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-09 15:15
Severity ?
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
4.4 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L
Summary
Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F43FE6B-1CE0-4C93-B457-385D60D0BC7E", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EAFCA2B5-1192-4E6A-B348-44ECFC4C4465", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CED4A938-7B21-4DBE-945E-04FD76712CDD", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35BC64A9-A82B-4D1A-A070-541F429632FD", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E2909C50-60B7-45A4-A597-B9B13A3136C6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5F5AAD-06AB-4AE2-ADDF-C704278B1E63", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8B13FA57-6D07-4461-B40C-227977EFB67F", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D45D2D3-EACD-40A7-A2E4-3E4918C1AAFE", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9BBB5C7-942A-4B1D-9219-7D158D6B65E3", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9EA98910-C8B0-4449-A3AD-5C2356C917A8", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4A92937F-8BB5-4D63-A589-58BF847F06CA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB76635-870C-4304-B435-FFCD671FA882", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C0B8817-B424-4F8C-B6A0-8305C6317A65", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "661AC564-7A60-4E10-ADC3-964A04FBA896", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B7EB27B-1963-4057-9088-CBC6FBCD91F6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B8ED95C-4703-4C83-B787-096FB2730CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "69C1BF26-EE53-4D48-A4CB-FB04E3DE6697", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2499FB92-B422-4E92-960B-FB67B4C8108F", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52B04F08-3447-4686-A965-65F8C7C64696", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F45D168-7370-454E-AA01-66A5F418AAFA", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5B612010-419B-4F5C-8B00-C5BCE6B20EE3", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5F85EA-6F0F-44C2-AC26-A2ABF03AEEA6", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "964257EB-311C-4323-AE2C-4BD97FB21798", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "816CE49A-4C18-4834-883B-2F19644C831D", "versionEndExcluding": "milanpi-sp3_1.0.0.9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.\n\n" }, { "lang": "es", "value": "Una validaci\u00f3n insuficiente de la asignaci\u00f3n de direcciones a IO en ASP (AMD Secure Processor) puede provocar una p\u00e9rdida de integridad de la memoria en el invitado SNP." } ], "id": "CVE-2021-26396", "lastModified": "2025-04-09T15:15:43.603", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-11T08:15:11.437", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-345" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-11 22:15
Modified
2024-11-21 05:00
Severity ?
Summary
A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2E43B1A-128E-405E-8570-C21581AEE166", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8ED025DE-E791-4801-B610-9AADDEC05A0A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4036E501-877E-4A70-AF00-EDA0AA0A4D88", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A potential denial of service (DoS) vulnerability exists in the integrated chipset that may allow a malicious attacker to hang the system when it is rebooted." }, { "lang": "es", "value": "Existe una posible vulnerabilidad de denegaci\u00f3n de servicio (DoS) en el chipset integrado que puede permitir a un atacante malicioso colgar el sistema cuando se reinicie" } ], "id": "CVE-2020-12988", "lastModified": "2024-11-21T05:00:37.340", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-11T22:15:11.603", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-08-10 20:15
Modified
2024-11-21 06:34
Severity ?
Summary
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | athlon_3050ge_firmware | - | |
amd | athlon_3050ge | - | |
amd | athlon_3150g_firmware | - | |
amd | athlon_3150g | - | |
amd | athlon_3150ge_firmware | - | |
amd | athlon_3150ge | - | |
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7002_firmware | - | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | - | |
amd | epyc_7003 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7373x_firmware | - | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | - | |
amd | epyc_73f3 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7453_firmware | - | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | - | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_7573x_firmware | - | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | - | |
amd | epyc_7773x | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3200u_firmware | - | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3350u_firmware | - | |
amd | ryzen_3_3350u | - | |
amd | ryzen_3_3450u_firmware | - | |
amd | ryzen_3_3450u | - | |
amd | ryzen_3_3500c_firmware | - | |
amd | ryzen_3_3500c | - | |
amd | ryzen_3_3500u_firmware | - | |
amd | ryzen_3_3500u | - | |
amd | ryzen_3_3550h_firmware | - | |
amd | ryzen_3_3550h | - | |
amd | ryzen_3_3580u_firmware | - | |
amd | ryzen_3_3580u | - | |
amd | ryzen_3_3700c_firmware | - | |
amd | ryzen_3_3700c | - | |
amd | ryzen_3_3700u_firmware | - | |
amd | ryzen_3_3700u | - | |
amd | ryzen_3_3750h_firmware | - | |
amd | ryzen_3_3750h | - | |
amd | ryzen_3_3780u_firmware | - | |
amd | ryzen_3_3780u | - | |
amd | ryzen_3_4300g_firmware | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge_firmware | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u_firmware | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5300g_firmware | - | |
amd | ryzen_3_5300g | - | |
amd | ryzen_3_5300ge_firmware | - | |
amd | ryzen_3_5300ge | - | |
amd | ryzen_3_5300u_firmware | - | |
amd | ryzen_3_5300u | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700x_firmware | - | |
amd | ryzen_5_2700x | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_4500u_firmware | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g_firmware | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge_firmware | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h_firmware | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600u_firmware | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_5500u_firmware | - | |
amd | ryzen_5_5500u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600g_firmware | - | |
amd | ryzen_5_5600g | - | |
amd | ryzen_5_5600ge_firmware | - | |
amd | ryzen_5_5600ge | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5600x_firmware | - | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_5_5700g_firmware | - | |
amd | ryzen_5_5700g | - | |
amd | ryzen_5_5700ge_firmware | - | |
amd | ryzen_5_5700ge | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_4700g_firmware | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge_firmware | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u_firmware | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h_firmware | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800u_firmware | - | |
amd | ryzen_7_4800u | - | |
amd | ryzen_7_5700g_firmware | - | |
amd | ryzen_7_5700g | - | |
amd | ryzen_7_5700ge_firmware | - | |
amd | ryzen_7_5700ge | - | |
amd | ryzen_7_5700u_firmware | - | |
amd | ryzen_7_5700u | - | |
amd | ryzen_7_5700x_firmware | - | |
amd | ryzen_7_5700x | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5800x_firmware | - | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800x3d_firmware | - | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_4900h_firmware | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_4900hs_firmware | - | |
amd | ryzen_9_4900hs | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900x_firmware | - | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5950x_firmware | - | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | - | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3050ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB1639FB-C5B9-4DC6-9758-43C628914D8C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3050ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "A394396F-CED4-4A52-ACA2-A0B74A1AE97E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3150g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE9915AD-D036-49FC-98AA-D2EEFEDF76A6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3150g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B233FD6C-2F8A-4542-B353-3E7B6D77CD94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:athlon_3150ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F810170-5792-4C69-9D0A-DC9422CB3D90", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:athlon_3150ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "6678421F-CD05-445F-B114-293609732777", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1498B525-660E-4D96-B723-FBDB65684F0F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16540EDF-3CC7-4E51-9E67-1A530330C951", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B48649-1E70-49CC-8E1A-5262B58A43B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D489967C-CD37-44C3-B8DB-7B813562909F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E03CC6F-1880-46F8-AF5C-4DD4BC1FC633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F37AAF-A618-46C3-9C49-4B6CD9BDA830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E04BD-4B95-4513-B832-30DF5332B77E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_2300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30C5C135-D432-4AEC-BB40-01FDA6A6E995", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3200u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02B85FAD-49E4-4DE4-BF8B-88F3C9772779", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3250u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "03B1F092-A9EA-4245-A154-2DFEA5D2A01F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBA86063-6EE8-446E-BCE1-210B0699103B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD9C1B7F-CA5E-4AC3-A2D4-0901907FE89F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3350u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4660E0A-B6EF-42C6-9098-5E78ACBF1A8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2452A625-5B59-49DF-A3C3-872642181E9D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3450u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62D1862B-8C77-4FBF-AA6D-EA3308311118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3450u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F7888EB-C587-44BF-95AC-05BE7776B5F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3500c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57A170DB-7E2C-4709-B1BC-E5C367BFB8A9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3500c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B3D9C3E-F342-4932-8287-844E1963D572", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6245B6C-1BAD-4877-9921-16E32466708A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C84A1505-E6CB-431C-B44D-1E26045F30B5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "813B1750-DC92-46A5-BF2B-041DBA196968", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "695A2D6B-A46C-475F-809F-B2715A41A936", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4518EEA9-2C4D-4615-A0F5-CF40C80285E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C2CD9B5-7469-4B8A-8653-4C71B00D0D2E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3700c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC59D0E5-A610-47D9-9820-6D5DA71C4FC7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3700c:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7FCAE2-1695-405A-AF62-9C9324BBCE09", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D27255DA-3451-492D-BC8C-F0ABD9746250", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "658FF986-FD92-487B-A7FA-43E1F96B0FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "21782BC7-E2F5-4377-B80A-56591F3D7C25", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9397E5A5-0694-4016-AEBC-41D7902F9A03", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87C31FA9-3DED-4794-8BB9-DCAD9F9FA9A3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6D51558-9F26-43D3-8BCB-4CD9A3DD7004", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "755801C1-7058-4584-BB7B-BE2BF9D5B78B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59172BDD-6177-4E6E-B9D7-C453EB1D651A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_4300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "738B7B07-8F15-4DCD-A361-70C1FF9CB4EF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5125c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1117C6B9-C87A-4185-A7DE-B4221BB59ABC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C21E19B0-BD1A-4B4A-9107-2224AF9FD813", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D34308FA-D6D1-4024-95F5-45C86EFBF00A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4AD470C-C960-40C9-BC06-236B2391332E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "94E19774-C744-46AC-B8F8-2B3E2BB19050", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5300u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9348AE1-C1F5-4512-9392-4A5971442EA1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDE2EB95-146C-4DFA-A627-3E4B3CDD5F88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5400u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98831A6B-A51F-48A9-80D7-B903A4F0A936", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54D38E49-513C-4AA7-AC8D-7FCDB3BB73CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_5425u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D97A583-39ED-4B1C-B7D9-48F0F56294A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E5F3921-FA39-4896-8546-DE603A70374A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6512668F-EEFB-4654-AE7F-9F71F89F3B65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "031C2DA9-0E24-450C-B57A-DC7C519D5F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8198CED9-216C-4573-B766-B6CDB3E6F7CD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62878C38-D2E3-452E-98FF-2ED2B6C256B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3450g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8650BE66-7694-4DD9-94E5-73A7DD0A124D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFDD574D-1799-4386-A906-705DC2F0978F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3550h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08E5BDBA-7E6B-4526-BDE6-BC90E3E1D705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3580u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA963063-2CBC-4CF4-8DD9-47A9448C6FBC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F6F176F-78BA-4E92-8C3E-0B7C7018F265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD852DB5-720F-473E-99EB-F037E81AA567", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30F5D1C5-6AAE-4226-A627-9F37D7131102", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E839C5C6-5544-4976-9AE7-55AADA09A48E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_4600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68244A90-6F59-4960-BB91-F2B8A745E2BD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "181E611F-CC4C-4F72-930D-93C3A85BF2A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C212F6CE-1920-44DC-AC13-4922A052CEBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5560u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA5ADD5B-C4F4-4BB4-8EFC-D949A79DFB0B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D677F2A4-8B2B-432F-89FC-14E8BCB909DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DDE6B0E7-AE27-4DE8-8AF2-801E57F5FC30", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6A2CC5A-3BD8-4DD8-8339-F8E627E65A1C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "F59A2AF2-5D13-480B-93CD-70AB6AEB60F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5898533-4CDE-496C-99A8-361F8C8E5A85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8928F3EB-EE42-4ABB-A76D-619AFEA284B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4DA33B2-B942-447F-9229-A41808411F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "91D4E46F-20BB-46BE-A36F-826E2A15E931", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7D9532A-0FA1-43E8-A2F7-B2436AF64189", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5625u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3C4424D-70E5-4101-B39C-15EEC4E933BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF14DD9D-3906-4E4F-804E-00B41525285C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F99F7EA-8CDF-45F5-9579-E902C3D02E7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1FF616-B7B9-41E1-9F16-86B24C5FA22C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C215E52-0E0C-42F5-9140-8313E847A2FC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B75781D-051F-44C1-B79F-1C32AFECFF65", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB5531-B88E-478C-A723-ADAE3E0C87F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DBF39F8-2317-432A-846D-7FEC2C35EEE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2093BCDB-70F3-4D90-B899-B2801F8A6059", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD6DE86B-DAAA-4A3B-9FFF-0583D5CB1B1E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_2800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F24782C-DBE2-488F-B935-49B4A8BC1E29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_2800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9825AB7C-7675-4364-BCE3-4C63BD41780A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0359E9DA-5BC0-48FD-962C-34358691E7DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C201AA2-D2FC-4240-A8F0-B8C55D7CCE31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D824D3D-E27D-4B6D-A7CC-0D42288AA5C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "937E2FA2-BED8-48FF-8D01-153D4039F224", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3750h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "936CD5C8-F583-40AB-A9F1-81CADD0CEF42", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "228E3FBD-F997-402D-AE96-B14D66390700", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3780u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27AC88BB-3495-4B0D-8C3F-8E6C46304E2B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3780u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E677F6F8-3F5A-4457-8B66-D5C06DA4CB4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F0D63B0-369D-4337-AC25-F0851C0C15C3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B44C21E-681A-4869-8D9D-D3898D9CBB3B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D14B4470-CF19-40F0-A765-08BA391F0E45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D640C5C-C906-41A2-96BC-19299ADB9446", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE6D732-6F55-4130-B95A-01ACC6EAB85F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "474D45CF-EBBE-4013-B8EC-BCA3293B36B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC61EAFD-15EA-427B-8419-E6EB2BCD78CA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D70D28B-809E-456C-96ED-84A4CA7EC942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_4800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF33521-012B-45BC-A860-7A5ADAB74488", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_4800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D1E9A6F-7339-4679-B83B-87BC1BEEFA16", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34798EA1-7F05-4F3D-BFBF-05385C1807EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6746407-9EC7-49B2-93B4-926174F2A457", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700ge_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "608EC8C9-A5EC-45DE-8C6D-8928D36A8FD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B481C5C-90C3-4DC2-85DF-F1EA0F409DF3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8390832E-A389-454A-B8F3-630708DDC9BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56772AAA-A5A9-4125-B4DB-939D583DA8E5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6100A4E-BBA5-4C5E-B58F-F3F0B168A19F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23B3A9DE-92BB-4D84-8773-F58BBF0EFBFC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A1449EC-F9D9-4846-A6E1-56F0B1EE8849", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13AB11C7-28F2-41AF-85D4-F391E02797A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FEDF9F0-CE97-4A9F-B4C2-EB3CF6E9507D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DC33A3B-F40D-4532-AA66-4E23360F94E2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A09152-93D2-493D-8CE0-8A4F30F0DD39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4D3A469-E7A2-44A0-963C-EE1D6BB2425D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E654C546-AAEE-4DDA-81B4-144DD5766F9F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "337E685C-4B65-441C-AD06-E8374CC39450", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825c:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DBB31D3-58CA-44EE-B115-77D1D83D9E23", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5825u_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9669B2E-9590-4521-AC69-E7F5F201CAA3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF398C51-EB53-4C3F-8D88-BD3931D9293F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_4900h_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BBC2B42-DEBE-4696-928A-353F48FA9546", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_4900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9BEC933-8C69-4E47-B527-DA3ED3233B2D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_4900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "79DC351B-8B09-4BB3-B8E0-D8B3F5D83122", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_4900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C5F418C-2989-44C0-A880-A7BBA067E581", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB09D697-326C-4902-BB5A-C5EAC9A2BD22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE64730D-B284-450E-9450-72AAEBAE2000", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD6028F-DD27-4D81-8E0A-06C2F1B9277C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9BDB04-877C-472D-A3BB-6C32FF269E00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "331E829F-D05A-4D6D-A017-A2BE0D7C3D09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EE2DD3E-51C4-4E21-BC43-CE567812B59A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "808C582D-4F80-4378-B177-012EEF438443", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C00179A-620B-4DC7-893A-11AFAB9EE13C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5980hx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1031085D-AD15-4124-803E-9B742E7484A0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5980hx:-:*:*:*:*:*:*:*", "matchCriteriaId": "8308D5A2-0985-487C-B16C-4EEF835BDD4F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDB416-B093-4871-8142-1D7EB5BF90B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "52C9FEEF-0D0F-40DC-9E98-248F8608B755", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59A9F95C-E531-40FA-BCE7-3CEB6E26497B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "3964CA7C-996C-43C5-B1A5-14046DAD07BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5454A72B-76EC-46D9-8675-97DC076D7615", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AF7F277-B1E1-4C44-B122-91A7B7D299DE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1B5369B-DFFE-4A84-8894-513AE7FC7C6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A986D34-FDDA-48D5-8762-2B1AF2C6DA3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7AE0210-F156-42BA-AAD5-177A2E845A4B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F74102-CBC1-4BB8-80A7-A2DCB6F4239A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "382DA0A9-0ADF-4ECC-AF71-CE021DC8B359", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "54611A05-BCA3-495A-8CDB-946FF47E0333", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "E38E22B3-AAAF-4075-9DEB-5198A8283E15", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC97F277-4BFD-41D7-A205-631C6FBE8DAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "B08A5CCF-054C-450B-93FC-8A3A4577CA00", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5965wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CC4654E-519B-4412-B551-F2436108152B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5965wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "A97EE77A-DB13-4A81-8BCD-E3BC1E45F420", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "38997E8B-D2B7-4AB2-BB6E-33966511AF38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B99E921-4023-4E28-BAB7-A830487B3850", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_5995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B4FF79D-843C-4F44-8F7D-F1EDBD6C5EC0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_5995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "51BD2B6B-A491-4430-ACDA-019C8E1D0348", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed \u201cZen 1\u201d, \u201cZen 2\u201d and \u201cZen 3\u201d that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information." }, { "lang": "es", "value": "La contenci\u00f3n del planificador de la unidad de ejecuci\u00f3n puede conllevar a una vulnerabilidad de canal lateral encontrada en las microarquitecturas de CPU de AMD con nombre en c\u00f3digo \"Zen 1\", \"Zen 2\" y \"Zen 3\" que usan multihilo simult\u00e1neo (SMT). Al medir el nivel de contenci\u00f3n en las colas del programador, un atacante puede filtrar potencialmente informaci\u00f3n confidencial" } ], "id": "CVE-2021-46778", "lastModified": "2024-11-21T06:34:42.120", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.1, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-08-10T20:15:24.717", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1039" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-07-11 19:15
Modified
2024-11-27 16:15
Severity ?
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
6.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_embedded_3101_firmware | - | |
amd | epyc_embedded_3101 | - | |
amd | epyc_embedded_3151_firmware | - | |
amd | epyc_embedded_3151 | - | |
amd | epyc_embedded_3201_firmware | - | |
amd | epyc_embedded_3201 | - | |
amd | epyc_embedded_3251_firmware | - | |
amd | epyc_embedded_3251 | - | |
amd | epyc_embedded_3255_firmware | - | |
amd | epyc_embedded_3255 | - | |
amd | epyc_embedded_3451_firmware | - | |
amd | epyc_embedded_3451 | - | |
amd | epyc_7232p_firmware | - | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_5552_firmware | - | |
amd | epyc_5552 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | - | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | - | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | - | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | - | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | - | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | - | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | - | |
amd | epyc_7773x | - | |
amd | epyc_9124_firmware | - | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | - | |
amd | epyc_9174f | - | |
amd | epyc_9184x_firmware | - | |
amd | epyc_9184x | - | |
amd | epyc_9224_firmware | - | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | - | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | - | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | - | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | - | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | - | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | - | |
amd | epyc_9374f | - | |
amd | epyc_9384x_firmware | - | |
amd | epyc_9384x | - | |
amd | epyc_9454_firmware | - | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | - | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | - | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | - | |
amd | epyc_9534 | - | |
amd | epyc_9554p_firmware | - | |
amd | epyc_9554p | - | |
amd | epyc_9554_firmware | - | |
amd | epyc_9554 | - | |
amd | epyc_9634_firmware | - | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | - | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | - | |
amd | epyc_9654p | - | |
amd | epyc_9684x_firmware | - | |
amd | epyc_9684x | - | |
amd | epyc_9734_firmware | - | |
amd | epyc_9734 | - | |
amd | epyc_9754_firmware | - | |
amd | epyc_9754 | - | |
amd | epyc_9754s_firmware | - | |
amd | epyc_9754s | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3101_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "907ABA86-2313-4D2F-832A-5F48E928553F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3101:-:*:*:*:*:*:*:*", "matchCriteriaId": "839C6991-D387-471D-9112-C79677D5A5AB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3151_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A2E7F4-70CB-4DF5-A60A-0AACC8E01AFB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3151:-:*:*:*:*:*:*:*", "matchCriteriaId": "3480338B-290F-4E9C-88F9-A4160853B9BD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3201_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68041D51-331A-4716-AF30-3B37C07F851C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3201:-:*:*:*:*:*:*:*", "matchCriteriaId": "6943C2EC-1555-40B8-9533-BBB6572E9073", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3251_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A518D997-F2ED-4489-AB69-871799C80DA4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3251:-:*:*:*:*:*:*:*", "matchCriteriaId": "44A54822-42B0-47B4-A080-416D5C8AC20C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3255_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFF9B650-F6D9-463E-8107-33C540A6E093", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F8DDDB3-E4B0-4354-955F-E2196E404970", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_embedded_3451_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "81333440-CC8B-4261-B9CC-ECA0A71BA7BB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_embedded_3451:-:*:*:*:*:*:*:*", "matchCriteriaId": "C38BB8F3-11AD-48C3-B751-AF93E3EA6138", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1527680F-0762-4E3E-BB6D-09866A1C610D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73789139-3498-4ED8-A80C-A8794BC176A7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE409172-E478-4557-977E-8EDF016F061D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "99075640-17C5-47EA-B9B5-FE72BA9C62C9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB83D414-FD6D-4502-B487-F0D00DAD3972", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D964031-15E2-461B-BC1B-213EF720E720", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77566843-4A30-441F-8FBA-7D3C76907BB1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A18D2F3-39A4-4D1E-963E-6D5BF93615FF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52817B56-DC1B-46C7-9F86-AE2E7328B7A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9921332-9BAE-4D93-A2FD-576D9BA72408", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8915EEB-7957-4145-B9CF-DEFDD2D613F1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "081BBB24-2EB6-4DAC-9B78-ABC114BAE6FB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BBC3B4-BD63-4895-AE29-E59396806AA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB5026DA-DB92-42FE-8FD8-07CBDCC4CA7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_5552_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA4DD36F-5A92-4D89-9FFA-580C30A5036C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_5552:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEFF9571-88E1-4BF1-B576-06AE45D58E91", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A82315CD-2E07-4BDE-9A9F-D06640680D76", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "08A14E26-5950-4B06-8AEE-5FF03415F4DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "955DF45C-0F81-4EE8-B7E2-0687122253AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "02C8C50D-2994-4AB7-AD1C-31560608D007", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00715133-F99C-49F2-9B0B-16D2F15E4D49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "51FFEC71-AB00-419D-A14D-8EEE2BEF9DA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FC1DBAF-E27D-47EA-9AA1-BCE7D4CAF0EA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B71C2E30-E155-49B8-B90F-F9844A25C155", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8502D97B-8208-431B-B350-32504B904816", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "609C4E3C-CFA6-43BC-8E9D-852E518B08D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "83955DFE-A91C-424A-AA6D-785964C97C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8505FAC6-A96D-4788-B23F-960D5AB533C2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4E052F-4883-4F6B-87B8-CFC432525948", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0A90AA1-346D-40F3-8408-A47D9334CA11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEE347B8-4B81-4332-ADFA-8A19D62D40D1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B4F63CB-6D48-471B-A0B2-3F99D8BECDD9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "74293FA6-D960-451F-A071-68F2E2AE86CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "52535E49-B319-448C-B189-72DFF244E50F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B016179A-6567-497E-9756-3B8EEC7FC1EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0546350C-6DF6-43AC-8439-578D2D292C09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C39E0BA-BC8B-4467-A716-9EE4AA21BDB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00718CCC-EE1B-4365-B1C0-E92D6662D9DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD0100D1-E4CF-4062-A260-D707845BF81A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D58FB5-0093-4487-8506-8430ED650258", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C6BC9B1-2FF6-43BC-9F10-E25ED70857BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A481233E-C479-4715-BB6C-CA5BCD6E3AD6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BE52C09-8D8C-4D93-BCF7-4C53728FDA49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "849E6D95-C3A8-457E-90D9-34ECAE5D1519", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B309264-F40F-4DEF-BBDB-1CC96E903EA5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "929A1953-903C-4B1D-B148-88E5A2F500BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC216C0-16D7-4DF0-A5C4-A952E4916925", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EA7278D-8165-4E5C-A9ED-F465B2A2D2E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "379AAAA6-F0BA-43AA-AFC6-CC1F4FACBEF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7889643-98F3-49E8-BD57-2DE56CC72B95", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "35151FC3-1B84-4BD5-8B99-EAFD3BAFCC9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E61E5F12-4818-4D67-B27C-36744D5F9B71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC521A8E-84A4-4831-8433-3CA909226FE5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "947EE825-C45D-4090-9855-260AA9903E5E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "00E06330-E43A-4A35-AE5D-FCC7E792C514", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E56DB5A-965B-4448-86C8-2E417665E4F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "26DC4D67-1C38-4118-BED6-71E5727CA55A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "421268E7-3C0D-42FB-90A8-6BA8E4A29F9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E61EB9F-8AF9-49FC-B142-B109DA826E66", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5BC4AC-09CF-456A-8021-E931D61B09DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5F0F8E5-32F2-40C9-814A-663A19B37D1D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ED7A173-AAB9-4EEF-957F-7940EB22F4A4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D43773D-4565-4273-A719-ACEAEBD679D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB9F36AB-0E6D-4854-A86B-3DE9AD084879", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37E9F62C-4DF2-45A6-BDC1-20AA24E85BF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F50338E3-725A-455F-9680-F700F5690057", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7D70506-EDBC-4ED9-9AD3-925610C03D7C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B1A2179-8415-460D-959B-1917AA2FCED7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8916EDB2-B9BA-4FA7-9591-DFB2E00DDC96", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "40D4BC04-155E-4A68-BFBD-9F7D81DB3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3A52919-B5ED-41F6-9CC6-C8468812322F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "\nA potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program\u2019s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.\n\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2023-20575", "lastModified": "2024-11-27T16:15:08.010", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-07-11T19:15:09.547", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-07 19:15
Severity ?
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
Summary
Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.\n" }, { "lang": "es", "value": "Una validaci\u00f3n de entrada insuficiente en la SMU puede permitir que un atacante bloquee recursos incorrectamente, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20532", "lastModified": "2025-04-07T19:15:48.707", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-11T08:15:14.147", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:00
Severity ?
Summary
Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in ASP firmware could allow less privileged x86 code to perform ASP SMM (System Management Mode) operations." }, { "lang": "es", "value": "Una condici\u00f3n de carrera en el firmware de ASP podr\u00eda permitir que un c\u00f3digo x86 con menos privilegios realizara operaciones ASP SMM (System Management Mode)" } ], "id": "CVE-2020-12951", "lastModified": "2024-11-21T05:00:34.727", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:07.423", "references": [ { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1027" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:34
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Insufficient DRAM address validation in System
Management Unit (SMU) may allow an attacker to read/write from/to an invalid
DRAM address, potentially resulting in denial-of-service.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | * | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | * | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | ryzen_9_3950x_firmware | - | |
amd | ryzen_9_3950x | - | |
amd | ryzen_9_3950xt_firmware | - | |
amd | ryzen_9_3950xt | - | |
amd | ryzen_9_3900_firmware | - | |
amd | ryzen_9_3900 | - | |
amd | ryzen_9_3900x_firmware | - | |
amd | ryzen_9_3900x | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_3700xt_firmware | - | |
amd | ryzen_7_3700xt | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3500x_firmware | - | |
amd | ryzen_5_3500x | - | |
amd | ryzen_5_3500_firmware | - | |
amd | ryzen_5_3500 | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_9_5950x_firmware | * | |
amd | ryzen_9_5950x | - | |
amd | ryzen_9_5900x_firmware | * | |
amd | ryzen_9_5900x | - | |
amd | ryzen_9_5900_firmware | * | |
amd | ryzen_9_5900 | - | |
amd | ryzen_7_5800x3d_firmware | * | |
amd | ryzen_7_5800x3d | - | |
amd | ryzen_7_5800x_firmware | * | |
amd | ryzen_7_5800x | - | |
amd | ryzen_7_5800_firmware | * | |
amd | ryzen_7_5800 | - | |
amd | ryzen_7_5700x_firmware | * | |
amd | ryzen_7_5700x | - | |
amd | ryzen_5_5600_firmware | * | |
amd | ryzen_5_5600 | - | |
amd | ryzen_5_5600x_firmware | * | |
amd | ryzen_5_5600x | - | |
amd | ryzen_5_5500_firmware | * | |
amd | ryzen_5_5500 | - | |
amd | ryzen_threadripper_3960x_firmware | * | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x_firmware | * | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x_firmware | * | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3975wx_firmware | - | |
amd | ryzen_threadripper_pro_3975wx | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | * | |
amd | ryzen_threadripper_pro_3795wx | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5871DB40-AF57-4031-990E-E99902CAF8FC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1661DEF6-006B-4C14-953A-5322141B4CF0", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99C92284-DD9E-4B5D-81D7-67990905C2EE", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E90EDBC7-C8C6-4DF1-BF23-C883611DD4FC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C459B1FE-D8ED-4483-8780-9134C3246B5E", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1855549F-70B0-4670-BF61-C0DD02525C45", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "70A4946C-DF6C-4CD8-9842-E5027FFAA078", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5A0DC6B5-3851-40B2-B959-524A6116A6DC", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EDCBAB98-1683-47C3-8DDB-BF39F6286B34", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F606E5D6-0113-4908-900D-E94F87E6481A", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFACA3C3-7481-45DF-9870-7761CB858B2D", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "149DCFDB-8062-4376-A7F7-645A8D40AC84", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C28F9044-4D6D-421D-8F8E-9A35DE6DA79E", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "07526B36-A301-49B4-A1B4-86D182D3BFD4", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "724E131E-E678-4AD7-B521-5E68882AF4BD", "versionEndExcluding": "naplespi_1.0.0.k", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D30A454D-0B71-4651-AFEB-E915BCB8AC9F", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "555BC41D-3E8E-49FE-BDF3-0D496B8A9147", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "99144DDA-F3EA-45E2-B470-ACD1652194F1", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7C40C74D-A6F9-4428-89E4-2201DD9E9919", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "09606942-FF1B-46A1-890D-65BDA7624704", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FBA9BBB-0FF7-4D15-8AD3-BF591D136B5F", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8964660C-AB5C-4932-942E-B2C6F223B097", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7C790F3-E6D1-4E00-9E48-C4FA4DB2A6B6", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "877949F7-C06F-4804-97BB-4147F348F7A0", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA520E42-E231-456B-AC4A-CBF7B42D1F4D", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D6DC9C5-2804-4320-8FA4-76A8F4665C73", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C812730D-D41C-4606-81E3-AB0A0389354D", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4E7658B-5AE0-451A-8EAA-0713FA20C2C9", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "938BE7DE-6094-4E7B-BC42-88EC0E037C8A", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42707648-1703-4FA0-8D64-2149DA2C7C49", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30368D7-2E1D-41D5-9E72-FB2D156C1AAF", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0D7C415-6952-4DCC-9EAE-50BD5DD8A226", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "956D2603-DB21-4349-BA0A-3DDD3AD8177A", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4613AA4-BE67-46B5-875C-A5D5CDEADB62", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E7E49B-F739-4B9F-94AA-64041A3E38F8", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6FC45BE-C55D-4FB4-A10E-89A80477251C", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "40F03482-025B-4323-831B-B0F985083CD8", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E51DCE34-419F-4645-899F-A02B352BDCA9", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F683539A-0D2B-4FE8-823C-01439E74CF3C", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9E27FD9-3F54-48A2-AA2E-EE797D264757", "versionEndExcluding": "romepi_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A826E63-E26F-4932-9BD3-03CC801BD9E0", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CCD54CF8-FE6F-4003-B9AF-D246928D4F22", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3B8BC8D8-B48F-4378-8146-3B74EDE84238", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03191635-46A1-48F5-BA2A-63A338B6ECC2", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51E7C98D-017B-4692-B3F0-1FAC416F23ED", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "39854CE5-EDBC-4B85-8CEC-5403BD7CD87F", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9AC77DD-429D-481A-A113-95D26F8CC537", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9C88FCC-891E-40A2-B038-3D913EDB9ED0", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BAD836DD-4A8B-43CC-8B2B-31ECD7297714", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5B8D399-2ACC-4D39-B3D0-AF8CF9F1318E", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCF3664E-44B5-4FF6-AD64-97F1CF387E88", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A941CDD6-443D-4E9A-8D6F-EF2FAF09804D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CCE4C50-17A5-4601-B673-45A67F36580A", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3765BA20-BE1E-49FB-BDFB-4880F5AFC564", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0F89354-0DF7-41DA-AAB0-8E1C7B3CE4A6", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "912F08B6-ED19-4302-AC99-293373CF217B", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5FECF09F-6B7B-461A-9657-6327D68ACA9D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C392C9F-A86C-485C-BF76-CF1E088041AE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "35A303BC-4BB5-446A-9D29-0AEFF0E8EF16", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E3EB55FE-81B4-445D-80B3-FA75F977B741", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "79F7E918-47C3-4772-A048-6E8EA363D6BD", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89E1C09E-A174-4279-BA21-15571BB90A7D", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E14FC6-B6BB-42A5-8805-AF6065557EEE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1CEDE31C-0AD0-4103-A4B1-10F898F61017", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD7D2FFF-E1B8-4B46-996B-94365ECA78A9", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F03231CC-4F68-4602-9F1F-C0BA96C74AA8", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1530CEE-B546-4FE5-93A2-2AEFDCD0F1F3", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BC954B29-33C0-4167-8B24-62F78C6B1AE5", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A6A5F753-93BE-4568-8487-39F65F90A8E3", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33A763A2-B6FD-4544-B051-60A43C716BEE", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "23BD0E26-B0B8-4613-8DD8-988AA6F33C36", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4276F58E-86C9-422D-A318-D3C809B53963", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A01E67D-A30F-46FA-B7ED-8ABF713694FA", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB2E339F-8B74-4FC2-BF6C-40DBB4E67AA8", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "434D661B-CC93-45AF-81DD-56D1224742DC", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3CAE0DC7-E2B7-41BF-ACE6-0C6A0D256269", "versionEndExcluding": "genoapi_1.0.0.8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F23104CA-40BB-497E-809E-B89BDBB8B844", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A468A5E6-BCFA-4141-955E-D7AFE1737913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3950xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FBF8C2-C17C-4688-AF07-CBCF22A86879", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3950xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "578B531F-3884-4F0A-AE99-9F5F3D3267A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CFA3FA5-601A-42DF-8FBD-846ED91ECE3C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5CB2C92-A84F-450D-BC0F-3675423DBF0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_3900x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53240910-3F88-465C-A0CD-A98395A05756", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_3900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED8BD87-468E-4953-96B1-CF923985B963", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6788A3F-6731-4529-AAFF-3CB893C0D07B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DC56C52-6200-47CD-A722-28A1437050B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3800xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A45A30A-6857-419E-8816-7EC9F8C8FEF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3800xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D814C2A-D794-46A8-9A06-CC4DB387176F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_3700xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A630AE54-9E40-4ABB-81DC-35D423785C44", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_3700xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "E772D4F6-B0AD-490F-BAF0-DADD3C8F5295", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D72FC510-6F4C-4D04-BEA9-9DDE22617CEF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600xt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD9B37D9-8A56-4058-9AFF-3BE64D95CC23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3600_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "15D68B5B-0878-47BA-9DCC-BF2D793F92E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927B2661-8988-484F-965C-D94AA9D52911", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500x:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0CD66B3-96B6-43A0-AA57-A548FF34B5F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_3500_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F0E87F5-65BA-477D-9679-907FD2906298", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_3500:-:*:*:*:*:*:*:*", "matchCriteriaId": "51A56423-3DDE-451B-AC47-51715AC74F41", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3300x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22B7FA81-11D0-4DC2-B81D-1BD48D341E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_3_3100_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "32B01772-B9AB-4724-BC36-C707E01C9EDB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5950x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8EB03625-1A44-46CF-BEE4-B9753A2067AD", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5950x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D51D4EF-7AD9-45F4-8179-BA0FE9890D13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4DDE971D-6762-4D3F-B574-6839D195BB6B", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2F99FD-5E86-4F30-B07F-0D50B2DEF5FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_9_5900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B018068-116B-4662-AB36-849F934F1AE7", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_9_5900:-:*:*:*:*:*:*:*", "matchCriteriaId": "34045719-7683-4621-929B-5F6B16B6A580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x3d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83E392A7-AEC8-4F8C-8761-1247CB1A0B23", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x3d:-:*:*:*:*:*:*:*", "matchCriteriaId": "487D6661-ECA7-44C0-BD46-FC8C03187B85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8985C782-787C-4B7E-8C0F-033654D84764", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C0D71DD-DCA9-4788-AFDD-758E78B2DC14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5800_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4012629D-3D3F-48ED-88A5-9F2CB44914F9", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5800:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E68C36-118D-41F9-900E-9F38F585A34D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_7_5700x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD8CE65-F4DB-4D0B-8A49-6161E201F791", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_7_5700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E309B1D5-E232-4F26-BF35-25A1542A5E10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65DE69E3-AE8A-42F9-897D-0950E7D074D0", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DE7ACE-6BBB-4B5E-8D15-80997A85004C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5600x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AE7618FD-A6A5-4DA6-93AE-253C8162F97F", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FD86A5C-A9A9-4C84-91D9-54F2516E8487", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_5_5500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98A4202-BDB2-4ED4-97AD-9048F3B8B08E", "versionEndExcluding": "comboam4_v2_pi_1.2.0.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_5_5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B0DB96-32E6-4EBD-952B-F34DDF9AC9F0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3960x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1F94DE3D-D26D-4B40-BF1B-E8269BEEA817", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3960x:-:*:*:*:*:*:*:*", "matchCriteriaId": "978DF75D-F7B7-40F6-8054-9551306106F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3970x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27B3BE05-DBBC-471B-9052-D6FEAC051033", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3970x:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDDFDB8A-5EFB-4D00-9E05-FC19B4CD8913", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_3990x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "27705130-C969-416F-94DF-4ACF94AEBE6F", "versionEndExcluding": "castlepeakpi-sp3r3_1.0.0.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_3990x:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D1A55FE-F144-494E-BCF0-7E367DA56E40", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3945wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A86733-31A4-4146-9539-01883B0D315A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3945wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D99997-1389-493E-BDEA-9904A46E48EE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3955wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3E5574E-5537-4F47-AB05-8A8D1D4C2BBF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3955wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDF7650-0A7D-48FF-AD78-2D2DBF3CD646", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3975wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E61614-68FD-437A-8037-801E0663CBD8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3975wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D16B66-A4EC-422D-856A-A862ECE13FBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3995wx_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37F1D3A8-2FD7-4767-BC2A-2ADA8A53ECCC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3995wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "015BEF9F-7CFC-4A99-B9B4-FB58B3F35E31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:ryzen_threadripper_pro_3795wx_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4366EF8-3B28-4433-8265-D2760120B2FD", "versionEndExcluding": "chagallwspi-swrx8_1.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:ryzen_threadripper_pro_3795wx:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE43349A-246E-45E9-8CD5-E417DB270445", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient DRAM address validation in System\nManagement Unit (SMU) may allow an attacker to read/write from/to an invalid\nDRAM address, potentially resulting in denial-of-service." }, { "lang": "es", "value": "Una validaci\u00f3n de direcci\u00f3n DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una direcci\u00f3n DRAM no v\u00e1lida, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2021-46774", "lastModified": "2024-11-21T06:34:41.667", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.3, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-11-14T19:15:10.407", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2024-11-21 06:34
Severity ?
3.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
9.1 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Summary
Insufficient input validation in the SMU may
allow an attacker to corrupt SMU SRAM potentially leading to a loss of
integrity or denial of service.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient input validation in the SMU may\nallow an attacker to corrupt SMU SRAM potentially leading to a loss of\nintegrity or denial of service." } ], "id": "CVE-2021-46762", "lastModified": "2024-11-21T06:34:39.943", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.9, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 2.7, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.1, "baseSeverity": "CRITICAL", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-05-09T19:15:11.080", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "psirt@amd.com", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-05-09 19:15
Modified
2025-01-28 16:15
Severity ?
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.8 (High) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
Insufficient syscall input validation in the ASP
Bootloader may allow a privileged attacker to execute arbitrary DMA copies,
which can lead to code execution.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_72f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | milanpi_1.0.0.9 | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | milanpi_1.0.0.9 | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | milanpi_1.0.0.9 | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7473x | - | |
amd | epyc_74f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | milanpi_1.0.0.9 | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | milanpi_1.0.0.9 | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | milanpi_1.0.0.9 | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | milanpi_1.0.0.9 | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | milanpi_1.0.0.9 | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | milanpi_1.0.0.9 | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | milanpi_1.0.0.9 | |
amd | epyc_7773x | - | |
amd | epyc_7232p_firmware | romepi_1.0.0.e | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | romepi_1.0.0.e | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | romepi_1.0.0.e | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | romepi_1.0.0.e | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | romepi_1.0.0.e | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | romepi_1.0.0.e | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | romepi_1.0.0.e | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | romepi_1.0.0.e | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | romepi_1.0.0.e | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | romepi_1.0.0.e | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | romepi_1.0.0.e | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | romepi_1.0.0.e | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | romepi_1.0.0.e | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | romepi_1.0.0.e | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | romepi_1.0.0.e | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | romepi_1.0.0.e | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | romepi_1.0.0.e | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | romepi_1.0.0.e | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | romepi_1.0.0.e | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | romepi_1.0.0.e | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | romepi_1.0.0.e | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | romepi_1.0.0.e | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | romepi_1.0.0.e | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | romepi_1.0.0.e | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | romepi_1.0.0.e | |
amd | epyc_7h12 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "A0E52D9A-F451-442A-97CD-A6EB0CDA762B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "527D8FB2-A298-4DDE-BD44-F00B25E53329", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7B901E51-FF70-4A0D-AE17-B4E6F65DDD71", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "B30DDBCA-59A0-453E-B18D-55402878173C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "2DBAD9F3-C163-4622-89C6-55EB576729C4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "804158A1-24ED-4C07-9A5C-428D3A5E3B6C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "631C0788-082E-4446-9139-1504EDB7060E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "7BA4C60B-40E2-4135-9F22-2832212F5506", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F8337884-F9D0-4416-A802-692C21564963", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "3E793EC7-097E-4709-97ED-32BA0C8CA641", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0CFC7016-4337-4A08-94DE-B2941BB0E8F8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "62451530-15BE-410C-A355-CBE77F14DB37", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "524B6330-8E16-4A28-8981-B972CF1814F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E7DA8-F3C8-4D32-A671-2532D396E390", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "1631DFE4-B5B1-4EF8-A9CB-FAD6F7695DF5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "20AA0C7B-53E7-42AA-839A-98AB9597C755", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "D7A8C5C6-CCC3-401B-9756-61BB85FB9CBA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "51F9C228-6542-40F0-AD06-C02B6DF02503", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0AC44765-B7D7-4EF3-9B6F-F16BCACBA832", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "0262BD10-02C3-4CB1-B448-D0A6B0657EF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "41B681B7-95CD-4351-A61D-E843D13D7E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "4969BA2D-3A4B-48C0-9A6D-79770D60FA85", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:milanpi_1.0.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "DC55A017-12C2-465C-994C-FD80597F23E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "CAE888DB-5E78-45DE-A38E-B44A5BE0D13B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6883D5DA-2812-4A9D-B5F6-5567148D3647", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AAC73DD1-A4D2-4D82-897C-49F7B297024B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B62CFEBB-1A64-49E5-8890-978C40AC750F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "A76933C3-6889-4B31-A323-12A069D443F5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BE98AFF4-5258-4A79-A0F6-D632F2FC3D72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "7EB3209A-257A-40DA-A9B1-FC59162A71F4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "FB39BE10-4C16-4CB7-BCE5-1A9693D39AF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E3996EE9-AAE4-4D7D-8350-5DFFE39A30EE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "EE51138E-1644-4AEC-B0EB-7F9DABAD3900", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "4D599825-8AC9-47B5-AB32-AD37E782FBC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "54683C0C-F80B-4F26-B3CA-42FFDDB78E28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "F8724684-E967-4BB4-84E1-E76F16868FB9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "1F27952D-B3D0-4AD5-B95B-E954111386FE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3024094D-A459-478B-A635-1C8B57260FA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "72E0C314-8523-446C-9DEC-37BCCB5A9118", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "E8960712-FBAE-41F7-AD54-6F396B381955", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "DAC409B6-5FE0-468F-BD7D-6828ADBEA242", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "9E0A72E7-A4B5-4191-BCD6-7ED8719633AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "B2413835-FEE5-4219-A23B-4690F420F3DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "AB2669C5-3B4A-4FF1-9A8B-69B86108B921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "3441E5C6-836C-418C-B221-947D4ADF6F18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "BC4EBBFE-4AEA-4B23-B441-AB0D9D6AF7DF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "549C81E1-2FBE-4056-B3CE-3F7977989E0C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:romepi_1.0.0.e:*:*:*:*:*:*:*", "matchCriteriaId": "6672C47B-0C66-4869-8866-886470A90BDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient syscall input validation in the ASP\nBootloader may allow a privileged attacker to execute arbitrary DMA copies,\nwhich can lead to code execution. \n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n" } ], "id": "CVE-2021-46769", "lastModified": "2025-01-28T16:15:32.440", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-05-09T19:15:11.200", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-01-11 08:15
Modified
2025-04-07 19:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Summary
Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7h12_firmware | * | |
amd | epyc_7h12 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7743_firmware | * | |
amd | epyc_7743 | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "856AF080-97A2-4C79-BA32-FCB35F0E2543", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FAAAE77-BAF6-48C6-827B-F2A6E2057420", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F15B3A78-7A86-40B5-B01E-C78445099A40", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2E45530-3D27-4129-A74F-76B7C01268A7", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C6386B61-191C-498B-8EB0-13E9E9813501", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2A8898F0-33DD-4864-8375-4563D4E0AB42", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E403604E-E759-46EC-ABE4-D02920CD986E", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C10AA8B6-775F-4EE3-A4AB-D960B9135638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "98A9A98D-DE9A-4C09-87FC-0759800E2507", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A0BAB016-BD2C-4F4A-9404-6A4538BCF638", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6ECE445A-CB24-4BBE-9C1E-38DC7F06C2E5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "271078B9-338F-489F-BE07-F6C3CA73DC9C", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "794A81DC-82E8-4653-8D7C-FE647E81B6F9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E1D539C9-9E68-4FED-B84A-6406E85F6257", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C6AB603-1B5B-4D51-A6C4-C65400D381E9", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DC9627E-1EEA-466D-A0C9-D709883000FE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F1BFFB5-F00D-46DC-A665-E3D7F54CD49A", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B289ACA-0609-490F-808E-C1D6E66775BD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E22A4E0B-6E52-49EB-B81B-44E6331801DE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8BD7EAC7-D797-4A4C-ABE9-D2602C4936CD", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37F65D10-D891-4C0A-A942-82E2039538D6", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C1AD149D-317E-4D90-94EE-2C49B2C1E312", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E842F041-A573-4B71-B686-871771C88EAE", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B32CB87-D10F-429F-84B2-F6084638450D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AA00554-6BE7-4443-8BF2-F66D486E7DF5", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C5851F9-4074-48C7-B6C4-16E994C5045D", "versionEndExcluding": "romepi_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "15A7FC33-9F8F-4862-8CF9-FC39D3493EAA", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "934DEED4-7118-435E-AF96-C34EC71D3AE5", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9710AF52-5E45-44CE-88EB-821F538A1692", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2807BF4F-10B8-470A-8646-A8224E04DCCD", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F793F124-BC16-48C7-9FB6-4932EE153E31", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D54F40EC-C433-4FB6-A07A-8C81FD3E04A7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "44F9FCF1-CA75-4688-BD62-487029054E35", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C092D5C7-369F-4EED-90FA-10091BB49861", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3375DF8B-D0D7-4888-8D24-0A1834E4FD2C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "157CD272-1F01-4514-81A2-8B4E7E177C5C", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45168C28-F506-4D42-92D1-FF1AE03044D9", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "258BFA6D-AFF2-4199-A59A-85643DB6A561", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38DAF4CB-74A0-4404-83F2-00D78E7B5EAB", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "00C17F69-0E8C-4272-8412-CE33F594E740", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A775676-D398-43F5-AD5D-C4FD8ECD2AC4", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7743_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "81334861-6BFD-4DF2-9EDD-45F14044FB6A", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7743:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C206A50-1225-4CC8-BC38-A7FEF4E2BA54", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0FB69E43-DCB4-432C-9ED3-D7364F75AA58", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4D11A474-6C0F-4B95-85F6-138C98D1F32B", "versionEndExcluding": "milanpi_1.0.0.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.\n" }, { "lang": "es", "value": "Las comprobaciones limitadas insuficientes en la SMU pueden permitir que un atacante actualice el espacio de direcciones desde/hasta a un valor no v\u00e1lido, lo que podr\u00eda provocar una denegaci\u00f3n de servicio." } ], "id": "CVE-2023-20529", "lastModified": "2025-04-07T19:15:48.010", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2023-01-11T08:15:13.897", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1032" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" }, { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2024-08-13 17:15
Modified
2024-12-12 20:29
Severity ?
5.3 (Medium) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N
Summary
IOMMU improperly handles certain special address
ranges with invalid device table entries (DTEs), which may allow an attacker
with privileges and a compromised Hypervisor to
induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a
loss of guest integrity.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@amd.com | https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_8024pn_firmware | * | |
amd | epyc_8024pn | - | |
amd | epyc_8024p_firmware | * | |
amd | epyc_8024p | - | |
amd | epyc_8124pn_firmware | * | |
amd | epyc_8124pn | - | |
amd | epyc_8124p_firmware | * | |
amd | epyc_8124p | - | |
amd | epyc_8224pn_firmware | * | |
amd | epyc_8224pn | - | |
amd | epyc_8224p_firmware | * | |
amd | epyc_8224p | - | |
amd | epyc_8324pn_firmware | * | |
amd | epyc_8324pn | - | |
amd | epyc_8324p_firmware | * | |
amd | epyc_8324p | - | |
amd | epyc_8434pn_firmware | * | |
amd | epyc_8434pn | - | |
amd | epyc_8434p_firmware | * | |
amd | epyc_8434p | - | |
amd | epyc_8534pn_firmware | * | |
amd | epyc_8534pn | - | |
amd | epyc_8534p_firmware | * | |
amd | epyc_8534p | - | |
amd | epyc_9734_firmware | * | |
amd | epyc_9734 | - | |
amd | epyc_9754s_firmware | * | |
amd | epyc_9754s | - | |
amd | epyc_9754_firmware | * | |
amd | epyc_9754 | - | |
amd | epyc_9184x_firmware | * | |
amd | epyc_9184x | - | |
amd | epyc_9384x_firmware | * | |
amd | epyc_9384x | - | |
amd | epyc_9684x_firmware | * | |
amd | epyc_9684x | - | |
amd | epyc_9124_firmware | * | |
amd | epyc_9124 | - | |
amd | epyc_9174f_firmware | * | |
amd | epyc_9174f | - | |
amd | epyc_9224_firmware | * | |
amd | epyc_9224 | - | |
amd | epyc_9254_firmware | * | |
amd | epyc_9254 | - | |
amd | epyc_9274f_firmware | * | |
amd | epyc_9274f | - | |
amd | epyc_9334_firmware | * | |
amd | epyc_9334 | - | |
amd | epyc_9354_firmware | * | |
amd | epyc_9354 | - | |
amd | epyc_9354p_firmware | * | |
amd | epyc_9354p | - | |
amd | epyc_9374f_firmware | * | |
amd | epyc_9374f | - | |
amd | epyc_9454_firmware | * | |
amd | epyc_9454 | - | |
amd | epyc_9454p_firmware | * | |
amd | epyc_9454p | - | |
amd | epyc_9474f_firmware | * | |
amd | epyc_9474f | - | |
amd | epyc_9534_firmware | * | |
amd | epyc_9534 | - | |
amd | epyc_9554_firmware | * | |
amd | epyc_9554 | - | |
amd | epyc_9554p_firmware | * | |
amd | epyc_9554p | - | |
amd | epyc_9634_firmware | * | |
amd | epyc_9634 | - | |
amd | epyc_9654_firmware | * | |
amd | epyc_9654 | - | |
amd | epyc_9654p_firmware | * | |
amd | epyc_9654p | - | |
amd | epyc_7203_firmware | * | |
amd | epyc_7203 | - | |
amd | epyc_7203p_firmware | * | |
amd | epyc_7203p | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7303_firmware | * | |
amd | epyc_7303 | - | |
amd | epyc_7303p_firmware | * | |
amd | epyc_7303p | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7373x_firmware | * | |
amd | epyc_7373x | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_7473x_firmware | * | |
amd | epyc_7473x | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | * | |
amd | epyc_7573x | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7773x_firmware | * | |
amd | epyc_7773x | - | |
amd | epyc_7643p_firmware | * | |
amd | epyc_7643p | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7663p_firmware | * | |
amd | epyc_7663p | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C98F5728-3653-4F17-804A-B658C1195033", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "364B9EAB-E113-4370-ACDC-92BFD54BEF88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4046AE4-F5D5-4B82-9E58-5970575E9908", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", "matchCriteriaId": "29BACF50-D9DB-4207-BF61-CACDCC3870E9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACBEB6E8-2D4A-4D15-91A6-F9C1A2572FDC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "030095CD-24D9-4033-A0C5-74C55083726D", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF4299D7-608D-4628-A8FE-DC0DBC09670F", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "15981CBF-CB09-416E-AB31-54D650182EBD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7138757-214C-44E2-9873-9F00EAAFFBA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E7978A2-777E-45D1-8036-7A4A72750AD8", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4886768-DAFF-481E-894F-F8E816B36EB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A25A14B0-641D-4EAE-93C8-2ED73698BA70", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4406C0DB-2EA0-4307-B8D1-8CD59CD2D722", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9241D42-1771-4528-8436-EE3FDE20C042", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08631494-65FE-4052-A572-AAA959DDC4A7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", "matchCriteriaId": "5323D02F-E25A-460D-8DA1-F8C72E635E53", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "52910ADE-A9DE-477A-95DE-F8842BDF8BCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF46284-ED2F-45F9-A4E8-221593FB7F49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4E7D4A0-5D38-4505-A272-03AAFA3C3904", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEABF567-1E41-4FD2-876E-7D2689A01D51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "51A9A1EA-F6E1-496D-B406-24602D845392", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CFA9B863-5296-44E8-90FE-F07115B32D4A", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4CAD221F-4A56-439B-A25C-E280792ACA60", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9FBE4F8-5043-4D9E-A263-17DA6BAE7DBB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCDF1C52-B820-4F82-9E24-F460180D06F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "38B20E51-60E2-4309-A6F2-3F3F1F22B325", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", "matchCriteriaId": "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3F61F4E-9324-4CC9-B030-33A4B1F1982C", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", "matchCriteriaId": "2761489D-AABE-4ADD-AE5B-B26C4424F18A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "865C7A18-D151-4DEA-9279-6EE21CA02EBC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7811418-4B63-4CCA-B81F-379FF0277673", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2552E1CD-3D25-4A86-B435-8A2A4223AE35", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", "matchCriteriaId": "B085546F-4791-4096-A019-738A37353165", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F3328406-7B6F-45E9-BAF0-AF46E87BA6A5", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFDF951D-9B67-49CE-AD4A-B1052A484E65", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC5B5271-0CE8-402F-95F6-3C5E3C6E9977", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", "matchCriteriaId": "54EE0A4A-AA13-49CE-8825-407AD6B16B13", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1A672DC-A7F4-4115-907C-89570F552582", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B1047C6-4627-4520-AFF7-5A0A623336F9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45F37CB5-08DB-4E7A-80B8-789FB445E8F7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A152B84-4935-4517-BD9D-37471C281BDA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5B71C11-5093-4CC8-8A73-5AA4F44E6FDB", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0F7101-1B8B-454B-879F-8635CB16D5C7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3BA656D-90DC-41A5-9AC7-A3D94B7B1351", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", "matchCriteriaId": "14BA8C50-B57A-4F6D-860B-790BD39249B0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "705841B7-77D9-4FDB-8D71-1C0AD96FEAA7", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", "matchCriteriaId": "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13F55ED1-AA9B-476E-AE54-630E8B28911A", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", "matchCriteriaId": "932E47BF-3831-4D72-9F26-89CA591692B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CDD8CF52-1EF0-4718-8FE3-C83103BB2459", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1520823-129F-4F48-932B-1CA77D3446CC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "608CCBAB-A934-4989-82BE-25042F0E5A57", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CAEA2412-28EC-4589-9B3F-78F451EF2048", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", "matchCriteriaId": "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D7493D0B-1DB4-436E-A297-8F931C2EFBCC", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A5E762D7-9BBA-4DF9-B9DA-6EC62C303ECD", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BDCABE02-1723-4859-B863-805A7C37014B", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", "matchCriteriaId": "84209250-5078-4E8E-8532-98F652C12D79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CECE4403-4C94-4CF0-983C-76720122738E", "versionEndExcluding": "genoapi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", "matchCriteriaId": "C150CC54-2F64-48E7-B996-F06247114BC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B3AB732A-0FAD-46FB-994C-38A951F6F186", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44C8195-1621-4327-BBFA-8AFA36BED7AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87E33F00-8FD4-4BA2-B33C-97DD8EAE658E", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A1C8CBB1-EBF5-4339-B381-FB627CE1F6B9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F1B97E1-0559-44E0-B2D9-A03354700E9A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE26D1A9-79F1-48B0-854F-84421A261E5C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "83DD388C-713A-4790-8C28-F33DA972B559", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", "matchCriteriaId": "88ACBFE2-C462-454E-9481-34BDF42237C8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1B3B6C95-72E5-4364-930B-75DE7011C9D1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "62A5CA50-BFAB-4470-98CB-1478DD281960", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C647A92B-882A-432A-9CC3-7BFDCFF20F07", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D71E8010-E3AE-4847-B20D-D4A94FE2E982", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0A0BC87-4F31-487E-8142-8B55F67D2261", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "095CA571-847E-47F2-AD91-DFD2B1DE99FF", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0F7E9590-2921-4539-A88A-9031256141B8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76ED00CB-FAEC-401F-BCE6-7505FC79052D", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FAF1298A-F225-4B9D-B3DB-B69ED9139FE1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FCC7A394-F354-45AC-8DBE-84F6F1B8CD69", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "273BB81D-1FB1-4656-B62A-1EAC317D1F0B", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C15272B3-8A7D-4BDE-B3D9-2A98A0C1EBD1", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "14FE1816-DFCE-442B-9AF1-132F7E909445", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "71158ABF-441E-4A1B-8A59-EDF65DDD0F10", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5427628C-6F24-4615-BD65-263EC4001E4A", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "25CCA953-04A4-4698-9985-FB97DA3EB536", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "13E4D0A9-CF7D-41B0-B024-7D6726481280", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E6937F59-A50E-4C4E-AA46-C2C7B692D7F5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9A499E19-B92C-4B89-84C5-8C66B42077E9", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", "matchCriteriaId": "F05F9B7A-9777-461E-B88E-96592F87A49E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BEE89-7D49-44C1-B608-940C453AC6A8", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A87082D-AEFA-401D-AEAA-E11DCB07DC62", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C5E0C31-BF05-4B92-ACA1-84071764E077", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CF5BE306-1E32-4CD7-9B5A-27F7167937CC", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B1F02204-DC4A-4C35-B4E2-C8082516EBE5", "versionEndExcluding": "milanpi_1.0.0.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IOMMU improperly handles certain special address\nranges with invalid device table entries (DTEs), which may allow an attacker\nwith privileges and a compromised Hypervisor to\ninduce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a\nloss of guest integrity." }, { "lang": "es", "value": "IOMMU maneja incorrectamente ciertos rangos de direcciones especiales con entradas de tabla de dispositivos (DTE) no v\u00e1lidas, lo que puede permitir que un atacante con privilegios y un hipervisor comprometido induzca fallas de DTE para eludir las comprobaciones de RMP en SEV-SNP, lo que podr\u00eda provocar una p\u00e9rdida de integridad del hu\u00e9sped." } ], "id": "CVE-2023-20584", "lastModified": "2024-12-12T20:29:14.730", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 4.0, "source": "psirt@amd.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 4.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2024-08-13T17:15:19.713", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-11-16 19:15
Modified
2024-11-21 05:56
Severity ?
Summary
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
amd | epyc_7003_firmware | * | |
amd | epyc_7003 | - | |
amd | epyc_7002_firmware | * | |
amd | epyc_7002 | - | |
amd | epyc_7001_firmware | * | |
amd | epyc_7001 | - | |
amd | epyc_72f3_firmware | * | |
amd | epyc_72f3 | - | |
amd | epyc_7313_firmware | * | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | * | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | * | |
amd | epyc_7343 | - | |
amd | epyc_73f3_firmware | * | |
amd | epyc_73f3 | - | |
amd | epyc_7413_firmware | * | |
amd | epyc_7413 | - | |
amd | epyc_7443_firmware | * | |
amd | epyc_7443 | - | |
amd | epyc_7443p_firmware | * | |
amd | epyc_7443p | - | |
amd | epyc_7453_firmware | * | |
amd | epyc_7453 | - | |
amd | epyc_74f3_firmware | * | |
amd | epyc_74f3 | - | |
amd | epyc_7513_firmware | * | |
amd | epyc_7513 | - | |
amd | epyc_7543_firmware | * | |
amd | epyc_7543 | - | |
amd | epyc_7543p_firmware | * | |
amd | epyc_7543p | - | |
amd | epyc_75f3_firmware | * | |
amd | epyc_75f3 | - | |
amd | epyc_7643_firmware | * | |
amd | epyc_7643 | - | |
amd | epyc_7663_firmware | * | |
amd | epyc_7663 | - | |
amd | epyc_7713_firmware | * | |
amd | epyc_7713 | - | |
amd | epyc_7713p_firmware | * | |
amd | epyc_7713p | - | |
amd | epyc_7763_firmware | * | |
amd | epyc_7763 | - | |
amd | epyc_7232p_firmware | * | |
amd | epyc_7232p | - | |
amd | epyc_7252_firmware | * | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | * | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | * | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | * | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | * | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | * | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | * | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | * | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | * | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | * | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | * | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | * | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | * | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | * | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | * | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | * | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | * | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | * | |
amd | epyc_7702 | - | |
amd | epyc_7702p_firmware | * | |
amd | epyc_7702p | - | |
amd | epyc_7742_firmware | * | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | * | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | * | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | * | |
amd | epyc_7f72 | - | |
amd | epyc_7251_firmware | * | |
amd | epyc_7251 | - | |
amd | epyc_7281_firmware | * | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | * | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | * | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | * | |
amd | epyc_7351p | - | |
amd | epyc_7401_firmware | * | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | * | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | * | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | * | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | * | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | * | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | * | |
amd | epyc_7601 | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F21749-D015-4195-BCF5-0EC546559090", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7002_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E55A8C48-979D-4824-BCCB-D3C6FE1BAECD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C627691-E9D3-499E-B072-20DF97408152", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2C7CAA93-4553-4EE7-8DED-4E607F62DAF8", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C793CE0D-A5D2-4279-8A2E-056C0E34DCD3", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C951EB53-A85E-4AC3-8076-167AD244B605", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA050CB2-9587-4534-A766-D434ED2BA2BA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B09197BA-5C2D-4616-BADF-A6D2FE9FB044", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85E3C6E9-D601-4BC0-99B8-118D1CCAE1D4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC530984-C23F-4C2A-B07A-689C69C08EC4", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1271AB1A-2AD6-4837-801F-53B25724AD06", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7596F9F6-7216-4A6C-A1A4-02F1719A5506", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", "matchCriteriaId": "241E39FF-FE66-444C-A4C2-3D28C45341BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "01FE866B-C654-4A7A-B65A-A3BEFA896D87", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0655082D-02E4-4708-B749-F035E87A3CCA", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30CDB8F3-A757-449B-A66E-3F0E443E6001", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F375A23-E6B5-4998-960D-764AE7F2E202", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1DD8F2DC-5263-4FDF-B13A-70A4D15361A0", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FA78545E-FDD6-49DA-8DDD-F1FB504EC59A", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9B05DF1-54B5-4C8D-ABEB-489D0ED90FFC", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD918198-F9C6-41B3-A338-F64DEBCC017C", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5BB074EC-A5CC-4E6A-8CDF-80B0E04D70B1", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "89BE6D92-D0B1-4092-ACB7-DE987FC026B5", "versionEndExcluding": "milanpi-sp3_1.0.0.4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0DBC6D60-29B4-4A9C-B991-D8968A218F20", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*", "matchCriteriaId": "16D55BEF-AFC8-45DC-9401-5DEF374E16C5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "57089BAE-679F-473F-9737-E7122BFC48F2", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "145D27E6-850A-49AA-AAB3-B432151A41D1", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "85EF80C4-99FA-4662-867A-9E4B766D3CB9", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "483A580F-1308-4898-B995-2D5DFB445205", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA3612A0-938A-4148-9008-A4267D7C5B98", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F77A628F-9D88-4868-996D-D44AAD8E1D85", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "289C6D4D-8BC6-4DE3-8355-13AC1940F9EE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9574E-39B8-4FEE-B560-20BA5019F4CE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A1964EC-9D00-4399-8C9C-469EB7195039", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6E4577E-D638-4E6F-A4DA-2F1EBDF1BB7C", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2F07874-0B84-4321-B5A2-BD655F001FEF", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "58DA87AB-FA43-4C46-96DC-B6A117722A8E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "798F2DE0-23D0-47A7-9187-4C9AF5F1A4BE", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "08A5A80E-1468-4F29-BD8E-65E8B1998B17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBAC3939-49D7-4338-A138-17987C0EB577", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A8BF36F9-F3D2-47D8-9AC4-598CEAFE8DB3", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E9580EB1-B700-40C9-92F7-0C7F0A31321D", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7132A01F-5DAA-4543-9680-2B7F66329F90", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "495CC88D-C7EC-4229-AB47-1DA2500C7676", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*", "matchCriteriaId": "72C86198-0BD4-42E1-974B-70A49F82C411", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "32190150-8A13-465C-9507-652D6EF1668B", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2E976EAC-4465-4B59-B753-2EF177B1AAAD", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "137A3BE7-9131-4741-A675-AA2325F4828E", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "648F6B48-DD12-4454-9195-9EA700289E17", "versionEndExcluding": "romepi-sp3_1.0.0.c", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "02C77DA8-878C-46F4-8DE9-7575D70771A8", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FCD6F2B-1BD9-4B9F-9C84-7A6AF7973313", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A45CDE52-D368-440D-BED5-4CEF5DBD1D6E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "183E251A-D6B9-4099-B6DA-68807AE75F31", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45E02BA5-5765-4F88-9437-4859C5642B8E", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "34F6214E-3284-4354-BAC1-0D8139BB8CCD", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "37575B0E-7209-4F39-B0F2-9DC087CEDFEC", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EA119723-3E05-4E11-BAB9-1F429058BBC0", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8517E293-1543-4AA4-9861-A0D71A6C0482", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B6808726-DA60-4E60-96EE-363F37400C66", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "596D8BCF-DA78-4B50-BF74-92D2D365D84A", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1C87955A-0D87-4033-9471-91959DB33F33", "versionEndExcluding": "naplespi-sp3_1.0.0.g", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources." }, { "lang": "es", "value": "AMD System Management Unit (SMU) puede experimentar un desbordamiento en la regi\u00f3n heap de la memoria que puede resultar en una p\u00e9rdida de recursos" } ], "id": "CVE-2021-26330", "lastModified": "2024-11-21T05:56:07.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-11-16T19:15:08.083", "references": [ { "source": "psirt@amd.com", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1021" } ], "sourceIdentifier": "psirt@amd.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-122" } ], "source": "psirt@amd.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-11-09 21:15
Modified
2024-11-21 06:49
Severity ?
Summary
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@amd.com | http://www.openwall.com/lists/oss-security/2022/11/10/2 | Mailing List, Mitigation, Patch, Third Party Advisory | |
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/ | ||
psirt@amd.com | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | ||
psirt@amd.com | https://security.gentoo.org/glsa/202402-07 | ||
psirt@amd.com | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 | Mitigation, Vendor Advisory | |
psirt@amd.com | https://www.debian.org/security/2023/dsa-5378 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.openwall.com/lists/oss-security/2022/11/10/2 | Mailing List, Mitigation, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NTQMPJC5N6XJYQ232OZFLK47HVZNRBY3/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YTMITQBGC23MSDHUCAPCVGLMVXIBXQTQ/ | ||
af854a3a-2127-422b-91ae-364da2661108 | https://security.gentoo.org/glsa/202402-07 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1040 | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2023/dsa-5378 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
xen | xen | - | |
amd | a10-9600p | - | |
amd | a10-9630p | - | |
amd | a12-9700p | - | |
amd | a12-9730p | - | |
amd | a4-9120 | - | |
amd | a6-9210 | - | |
amd | a6-9220 | - | |
amd | a6-9220c | - | |
amd | a9-9410 | - | |
amd | a9-9420 | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_silver_3050u | - | |
amd | athlon_x4_750 | - | |
amd | athlon_x4_760k | - | |
amd | athlon_x4_830 | - | |
amd | athlon_x4_835 | - | |
amd | athlon_x4_840 | - | |
amd | athlon_x4_845 | - | |
amd | athlon_x4_860k | - | |
amd | athlon_x4_870k | - | |
amd | athlon_x4_880k | - | |
amd | athlon_x4_940 | - | |
amd | athlon_x4_950 | - | |
amd | athlon_x4_970 | - | |
amd | epyc_7001 | - | |
amd | epyc_7002 | - | |
amd | epyc_7003 | - | |
amd | epyc_7251 | - | |
amd | epyc_7252 | - | |
amd | epyc_7261 | - | |
amd | epyc_7262 | - | |
amd | epyc_7272 | - | |
amd | epyc_7281 | - | |
amd | epyc_7282 | - | |
amd | epyc_72f3 | - | |
amd | epyc_7301 | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p | - | |
amd | epyc_7343 | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p | - | |
amd | epyc_7352 | - | |
amd | epyc_7371 | - | |
amd | epyc_7373x | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p | - | |
amd | epyc_7413 | - | |
amd | epyc_7443 | - | |
amd | epyc_7443p | - | |
amd | epyc_7451 | - | |
amd | epyc_7452 | - | |
amd | epyc_7473x | - | |
amd | epyc_74f3 | - | |
amd | epyc_7501 | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p | - | |
amd | epyc_7513 | - | |
amd | epyc_7532 | - | |
amd | epyc_7542 | - | |
amd | epyc_7543 | - | |
amd | epyc_7543p | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p | - | |
amd | epyc_7552 | - | |
amd | epyc_7573x | - | |
amd | epyc_75f3 | - | |
amd | epyc_7601 | - | |
amd | epyc_7642 | - | |
amd | epyc_7643 | - | |
amd | epyc_7662 | - | |
amd | epyc_7663 | - | |
amd | epyc_7702 | - | |
amd | epyc_7713 | - | |
amd | epyc_7713p | - | |
amd | epyc_7742 | - | |
amd | epyc_7763 | - | |
amd | epyc_7773x | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12 | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_3_5125c | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700 | - | |
amd | ryzen_5_2700x | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_7_4800u | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_7_pro_3700u | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_3960x | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | athlon_x4_750_firmware | - | |
amd | athlon_x4_750 | - | |
amd | athlon_x4_760k_firmware | - | |
amd | athlon_x4_760k | - | |
amd | athlon_x4_830_firmware | - | |
amd | athlon_x4_830 | - | |
amd | athlon_x4_835_firmware | - | |
amd | athlon_x4_835 | - | |
amd | athlon_x4_840_firmware | - | |
amd | athlon_x4_840 | - | |
amd | athlon_x4_845_firmware | - | |
amd | athlon_x4_845 | - | |
amd | athlon_x4_860k_firmware | - | |
amd | athlon_x4_860k | - | |
amd | athlon_x4_870k_firmware | - | |
amd | athlon_x4_870k | - | |
amd | athlon_x4_880k_firmware | - | |
amd | athlon_x4_880k | - | |
amd | athlon_x4_940_firmware | - | |
amd | athlon_x4_940 | - | |
amd | athlon_x4_950_firmware | - | |
amd | athlon_x4_950 | - | |
amd | athlon_x4_970_firmware | - | |
amd | athlon_x4_970 | - | |
amd | ryzen_threadripper_pro_3995wx_firmware | - | |
amd | ryzen_threadripper_pro_3995wx | - | |
amd | ryzen_threadripper_pro_3795wx_firmware | - | |
amd | ryzen_threadripper_pro_3795wx | - | |
amd | ryzen_threadripper_pro_3955wx_firmware | - | |
amd | ryzen_threadripper_pro_3955wx | - | |
amd | ryzen_threadripper_pro_3945wx_firmware | - | |
amd | ryzen_threadripper_pro_3945wx | - | |
amd | ryzen_threadripper_pro_5955wx_firmware | - | |
amd | ryzen_threadripper_pro_5955wx | - | |
amd | ryzen_threadripper_pro_5965wx_firmware | - | |
amd | ryzen_threadripper_pro_5965wx | - | |
amd | ryzen_threadripper_pro_5945wx_firmware | - | |
amd | ryzen_threadripper_pro_5945wx | - | |
amd | ryzen_threadripper_pro_5975wx_firmware | - | |
amd | ryzen_threadripper_pro_5975wx | - | |
amd | ryzen_threadripper_pro_5995wx_firmware | - | |
amd | ryzen_threadripper_pro_5995wx | - | |
amd | ryzen_threadripper_2990wx_firmware | - | |
amd | ryzen_threadripper_2990wx | - | |
amd | ryzen_threadripper_2970wx_firmware | - | |
amd | ryzen_threadripper_2970wx | - | |
amd | ryzen_threadripper_2950x_firmware | - | |
amd | ryzen_threadripper_2950x | - | |
amd | ryzen_threadripper_2920x_firmware | - | |
amd | ryzen_threadripper_2920x | - | |
amd | ryzen_threadripper_3990x_firmware | - | |
amd | ryzen_threadripper_3990x | - | |
amd | ryzen_threadripper_3970x_firmware | - | |
amd | ryzen_threadripper_3970x | - | |
amd | ryzen_threadripper_3960x_firmware | - | |
amd | ryzen_threadripper_3960x | - | |
amd | a12-9700p_firmware | - | |
amd | a12-9700p | - | |
amd | a12-9730p_firmware | - | |
amd | a12-9730p | - | |
amd | a10-9600p_firmware | - | |
amd | a10-9600p | - | |
amd | a10-9630p_firmware | - | |
amd | a10-9630p | - | |
amd | a9-9410_firmware | - | |
amd | a9-9410 | - | |
amd | a9-9420_firmware | - | |
amd | a9-9420 | - | |
amd | a6-9210_firmware | - | |
amd | a6-9210 | - | |
amd | a6-9220_firmware | - | |
amd | a6-9220 | - | |
amd | a6-9220c_firmware | - | |
amd | a6-9220c | - | |
amd | a4-9120_firmware | - | |
amd | a4-9120 | - | |
amd | ryzen_3_2200u_firmware | - | |
amd | ryzen_3_2200u | - | |
amd | ryzen_3_2300u_firmware | - | |
amd | ryzen_3_2300u | - | |
amd | ryzen_5_2500u_firmware | - | |
amd | ryzen_5_2500u | - | |
amd | ryzen_5_2600_firmware | - | |
amd | ryzen_5_2600 | - | |
amd | ryzen_5_2600h_firmware | - | |
amd | ryzen_5_2600h | - | |
amd | ryzen_5_2600x_firmware | - | |
amd | ryzen_5_2600x | - | |
amd | ryzen_5_2700_firmware | - | |
amd | ryzen_5_2700 | - | |
amd | ryzen_5_2700x_firmware | - | |
amd | ryzen_5_2700x | - | |
amd | ryzen_7_2700_firmware | - | |
amd | ryzen_7_2700 | - | |
amd | ryzen_7_2700u_firmware | - | |
amd | ryzen_7_2700u | - | |
amd | ryzen_7_2700x_firmware | - | |
amd | ryzen_7_2700x | - | |
amd | ryzen_7_2800h_firmware | - | |
amd | ryzen_7_2800h | - | |
amd | ryzen_3_3100_firmware | - | |
amd | ryzen_3_3100 | - | |
amd | ryzen_3_3200u_firmware | - | |
amd | ryzen_3_3200u | - | |
amd | ryzen_3_3250u_firmware | - | |
amd | ryzen_3_3250u | - | |
amd | ryzen_3_3300g_firmware | - | |
amd | ryzen_3_3300g | - | |
amd | ryzen_3_3300u_firmware | - | |
amd | ryzen_3_3300u | - | |
amd | ryzen_3_3300x_firmware | - | |
amd | ryzen_3_3300x | - | |
amd | ryzen_5_3400g_firmware | - | |
amd | ryzen_5_3400g | - | |
amd | ryzen_5_3450g_firmware | - | |
amd | ryzen_5_3450g | - | |
amd | ryzen_5_3500u_firmware | - | |
amd | ryzen_5_3500u | - | |
amd | ryzen_5_3550h_firmware | - | |
amd | ryzen_5_3550h | - | |
amd | ryzen_5_3600_firmware | - | |
amd | ryzen_5_3600 | - | |
amd | ryzen_5_3600x_firmware | - | |
amd | ryzen_5_3600x | - | |
amd | ryzen_5_3600xt_firmware | - | |
amd | ryzen_5_3600xt | - | |
amd | ryzen_7_3700u_firmware | - | |
amd | ryzen_7_3700u | - | |
amd | ryzen_7_3700x_firmware | - | |
amd | ryzen_7_3700x | - | |
amd | ryzen_7_3750h_firmware | - | |
amd | ryzen_7_3750h | - | |
amd | ryzen_7_3800x_firmware | - | |
amd | ryzen_7_3800x | - | |
amd | ryzen_7_3800xt_firmware | - | |
amd | ryzen_7_3800xt | - | |
amd | ryzen_5_3580u_firmware | - | |
amd | ryzen_5_3580u | - | |
amd | ryzen_7_pro_3700u_firmware | - | |
amd | ryzen_7_pro_3700u | - | |
amd | ryzen_7_3780u_firmware | - | |
amd | ryzen_7_3780u | - | |
amd | ryzen_7_4700g_firmware | - | |
amd | ryzen_7_4700g | - | |
amd | ryzen_7_4700ge_firmware | - | |
amd | ryzen_7_4700ge | - | |
amd | ryzen_5_4600g_firmware | - | |
amd | ryzen_5_4600g | - | |
amd | ryzen_5_4600ge_firmware | - | |
amd | ryzen_5_4600ge | - | |
amd | ryzen_3_4300g_firmware | - | |
amd | ryzen_3_4300g | - | |
amd | ryzen_3_4300ge_firmware | - | |
amd | ryzen_3_4300ge | - | |
amd | ryzen_9_4900h_firmware | - | |
amd | ryzen_9_4900h | - | |
amd | ryzen_7_4800u_firmware | - | |
amd | ryzen_7_4800u | - | |
amd | ryzen_7_4700u_firmware | - | |
amd | ryzen_7_4700u | - | |
amd | ryzen_7_4800h_firmware | - | |
amd | ryzen_7_4800h | - | |
amd | ryzen_5_4600u_firmware | - | |
amd | ryzen_5_4600u | - | |
amd | ryzen_5_4500u_firmware | - | |
amd | ryzen_5_4500u | - | |
amd | ryzen_5_4600h_firmware | - | |
amd | ryzen_5_4600h | - | |
amd | ryzen_3_4300u_firmware | - | |
amd | ryzen_3_4300u | - | |
amd | ryzen_9_5980hx_firmware | - | |
amd | ryzen_9_5980hx | - | |
amd | ryzen_9_5980hs_firmware | - | |
amd | ryzen_9_5980hs | - | |
amd | ryzen_7_5825u_firmware | - | |
amd | ryzen_7_5825u | - | |
amd | ryzen_9_5900hx_firmware | - | |
amd | ryzen_9_5900hx | - | |
amd | ryzen_9_5900hs_firmware | - | |
amd | ryzen_9_5900hs | - | |
amd | ryzen_7_5825c_firmware | - | |
amd | ryzen_7_5825c | - | |
amd | ryzen_7_5800h_firmware | - | |
amd | ryzen_7_5800h | - | |
amd | ryzen_5_5625u_firmware | - | |
amd | ryzen_5_5625u | - | |
amd | ryzen_7_5800hs_firmware | - | |
amd | ryzen_7_5800hs | - | |
amd | ryzen_5_5625c_firmware | - | |
amd | ryzen_5_5625c | - | |
amd | ryzen_5_5600h_firmware | - | |
amd | ryzen_5_5600h | - | |
amd | ryzen_5_5600hs_firmware | - | |
amd | ryzen_5_5600hs | - | |
amd | ryzen_7_5800u_firmware | - | |
amd | ryzen_7_5800u | - | |
amd | ryzen_5_5600u_firmware | - | |
amd | ryzen_5_5600u | - | |
amd | ryzen_5_5560u_firmware | - | |
amd | ryzen_5_5560u | - | |
amd | ryzen_3_5425u_firmware | - | |
amd | ryzen_3_5425u | - | |
amd | ryzen_3_5425c_firmware | - | |
amd | ryzen_3_5425c | - | |
amd | ryzen_3_5400u_firmware | - | |
amd | ryzen_3_5400u | - | |
amd | ryzen_3_5125c_firmware | - | |
amd | ryzen_3_5125c | - | |
amd | athlon_gold_3150u_firmware | - | |
amd | athlon_gold_3150u | - | |
amd | athlon_silver_3050u_firmware | - | |
amd | athlon_silver_3050u | - | |
amd | epyc_7001_firmware | - | |
amd | epyc_7001 | - | |
amd | epyc_7251_firmware | - | |
amd | epyc_7251 | - | |
amd | epyc_7261_firmware | - | |
amd | epyc_7261 | - | |
amd | epyc_7281_firmware | - | |
amd | epyc_7281 | - | |
amd | epyc_7301_firmware | - | |
amd | epyc_7301 | - | |
amd | epyc_7351_firmware | - | |
amd | epyc_7351 | - | |
amd | epyc_7351p_firmware | - | |
amd | epyc_7351p | - | |
amd | epyc_7371_firmware | - | |
amd | epyc_7371 | - | |
amd | epyc_7401_firmware | - | |
amd | epyc_7401 | - | |
amd | epyc_7401p_firmware | - | |
amd | epyc_7401p | - | |
amd | epyc_7451_firmware | - | |
amd | epyc_7451 | - | |
amd | epyc_7501_firmware | - | |
amd | epyc_7501 | - | |
amd | epyc_7551_firmware | - | |
amd | epyc_7551 | - | |
amd | epyc_7551p_firmware | - | |
amd | epyc_7551p | - | |
amd | epyc_7601_firmware | - | |
amd | epyc_7601 | - | |
amd | epyc_7002_firmware | - | |
amd | epyc_7002 | - | |
amd | epyc_7252_firmware | - | |
amd | epyc_7252 | - | |
amd | epyc_7262_firmware | - | |
amd | epyc_7262 | - | |
amd | epyc_7272_firmware | - | |
amd | epyc_7272 | - | |
amd | epyc_7282_firmware | - | |
amd | epyc_7282 | - | |
amd | epyc_7302_firmware | - | |
amd | epyc_7302 | - | |
amd | epyc_7302p_firmware | - | |
amd | epyc_7302p | - | |
amd | epyc_7352_firmware | - | |
amd | epyc_7352 | - | |
amd | epyc_7402_firmware | - | |
amd | epyc_7402 | - | |
amd | epyc_7402p_firmware | - | |
amd | epyc_7402p | - | |
amd | epyc_7452_firmware | - | |
amd | epyc_7452 | - | |
amd | epyc_7502_firmware | - | |
amd | epyc_7502 | - | |
amd | epyc_7502p_firmware | - | |
amd | epyc_7502p | - | |
amd | epyc_7532_firmware | - | |
amd | epyc_7532 | - | |
amd | epyc_7542_firmware | - | |
amd | epyc_7542 | - | |
amd | epyc_7552_firmware | - | |
amd | epyc_7552 | - | |
amd | epyc_7642_firmware | - | |
amd | epyc_7642 | - | |
amd | epyc_7662_firmware | - | |
amd | epyc_7662 | - | |
amd | epyc_7702_firmware | - | |
amd | epyc_7702 | - | |
amd | epyc_7742_firmware | - | |
amd | epyc_7742 | - | |
amd | epyc_7f32_firmware | - | |
amd | epyc_7f32 | - | |
amd | epyc_7f52_firmware | - | |
amd | epyc_7f52 | - | |
amd | epyc_7f72_firmware | - | |
amd | epyc_7f72 | - | |
amd | epyc_7h12_firmware | - | |
amd | epyc_7h12 | - | |
amd | epyc_7773x_firmware | - | |
amd | epyc_7773x | - | |
amd | epyc_7763_firmware | - | |
amd | epyc_7763 | - | |
amd | epyc_7713p_firmware | - | |
amd | epyc_7713p | - | |
amd | epyc_7713_firmware | - | |
amd | epyc_7713 | - | |
amd | epyc_7663_firmware | - | |
amd | epyc_7663 | - | |
amd | epyc_7643_firmware | - | |
amd | epyc_7643 | - | |
amd | epyc_75f3_firmware | - | |
amd | epyc_75f3 | - | |
amd | epyc_7573x_firmware | - | |
amd | epyc_7573x | - | |
amd | epyc_7543p_firmware | - | |
amd | epyc_7543p | - | |
amd | epyc_7543_firmware | - | |
amd | epyc_7543 | - | |
amd | epyc_7513_firmware | - | |
amd | epyc_7513 | - | |
amd | epyc_74f3_firmware | - | |
amd | epyc_74f3 | - | |
amd | epyc_7473x_firmware | - | |
amd | epyc_7473x | - | |
amd | epyc_7443p_firmware | - | |
amd | epyc_7443p | - | |
amd | epyc_7443_firmware | - | |
amd | epyc_7443 | - | |
amd | epyc_7413_firmware | - | |
amd | epyc_7413 | - | |
amd | epyc_7373x_firmware | - | |
amd | epyc_7373x | - | |
amd | epyc_7313_firmware | - | |
amd | epyc_7313 | - | |
amd | epyc_7313p_firmware | - | |
amd | epyc_7313p | - | |
amd | epyc_7343_firmware | - | |
amd | epyc_7343 | - | |
amd | epyc_72f3_firmware | - | |
amd | epyc_72f3 | - | |
amd | epyc_7003_firmware | - | |
amd | epyc_7003 | - | |
fedoraproject | fedora | 35 | |
fedoraproject | fedora | 37 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:amd:a10-9600p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD38BB02-752E-44C8-B878-FF7D4E95B452", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a10-9630p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6AC60D3-EE6C-46A3-8068-158D83995BD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9700p:-:*:*:*:*:*:*:*", "matchCriteriaId": "D60123EE-1B7B-4430-8B01-0591F31D54D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a12-9730p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DDA64FE-29DE-4A7B-82D0-D409B38BB67A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a4-9120:-:*:*:*:*:*:*:*", "matchCriteriaId": "0464E67E-DC8F-48CB-BA80-B3E3B7EC835F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9210:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6317AB4-E945-4BF6-A11B-7D076AEF74A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220:-:*:*:*:*:*:*:*", "matchCriteriaId": "88E56678-04A0-447E-BC96-0CF73A340C9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a6-9220c:-:*:*:*:*:*:*:*", "matchCriteriaId": "7947AC99-3250-46C6-8C92-382F8956B39B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9410:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECE7A27E-1900-4D51-B5F8-9C243CF3E544", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:a9-9420:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB9E0845-FB81-47FC-B083-D7A76AA49D14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_gold_3150u:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E11A9D-03EC-4014-BB1C-5286C694581B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_silver_3050u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CFF28BE-F049-4716-AADE-643FABB753A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_750:-:*:*:*:*:*:*:*", "matchCriteriaId": "824EE36A-E397-476A-B5CF-0C131FA74079", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_760k:-:*:*:*:*:*:*:*", "matchCriteriaId": "484FC127-05CB-423F-8CEE-C442ABEBC7E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_830:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E1A9D45-26F5-4E39-93D2-50DB41CF1EEF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_835:-:*:*:*:*:*:*:*", "matchCriteriaId": "005989E4-6826-46D8-AEFA-3B07FB6EF31C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_840:-:*:*:*:*:*:*:*", "matchCriteriaId": "303F661B-45E9-4AC1-9B98-62E4D705102D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_845:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F4A79BA-E498-4819-96C5-3D607A2727DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_860k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F165C3F-31AA-42E1-A6C4-33A9AC4A20C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_870k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C8A44FC-9790-4202-80BE-203AD0E86E15", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_880k:-:*:*:*:*:*:*:*", "matchCriteriaId": "132192AC-BC59-4C61-B826-F91A82956437", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_940:-:*:*:*:*:*:*:*", "matchCriteriaId": "684F36CB-2355-45F5-B6E1-7157CA9225D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_950:-:*:*:*:*:*:*:*", "matchCriteriaId": "192EE6CF-0494-458F-96EF-311FB6076AAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:athlon_x4_970:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0D2AFC8-9ED2-4E79-9669-5903DA5EFD5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9A05BAA-D9ED-411D-AEC7-DBD8998C345E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*", "matchCriteriaId": "C912AA31-FB2D-4BD9-B1BD-3C8D7EEE771C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*", "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B816918-6CCF-4010-AA16-7BF8A93AD7D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*", "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FBBFDD3-A85D-43A3-AD67-D69E91C633B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F187412-26C2-4D8C-9199-D7CCF49D6520", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*", "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*", "matchCriteriaId": "26FC5683-F612-4586-8BA3-FB1F66D8868B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*", "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A2E0AC0-8BDE-49F8-B067-DB03037921DD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02B61B7-7DD3-4164-8D32-EB961E981BC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9000686A-DC2B-4561-9C32-E90890EB2EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", "matchCriteriaId": "71B9C24B-2C10-4826-A91B-E1C60665FBBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", "matchCriteriaId": "180B3002-B3C5-48B5-8322-5B64B237C5B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*", "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*", "matchCriteriaId": "430C9955-0090-4166-8E90-D81C2AA7DE0D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*", "matchCriteriaId": "92EBDDBF-37C2-4D09-B744-F78169B2C1C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C474537-3006-41BA-8C3D-5C370E3ACECD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*", "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*", "matchCriteriaId": "68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02D08121-DC57-47D7-8214-23A209F0AF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BBC687-5C3C-4843-A028-B8BE29D1E302", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*", "matchCriteriaId": "563708A3-7C51-4693-B02D-9A25A639FE42", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8264DF4-47B4-4716-AE89-44AFA870D385", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDABE45-F529-453C-92DC-BF7747CEEC0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC94B03B-A7FE-47AE-969D-FFEF278A7A9B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", "matchCriteriaId": "52544912-FAA3-4025-A5FD-151B21CEC53B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", "matchCriteriaId": "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*", "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A6C7497-1B63-490F-B8EA-D9F3CB790952", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", "matchCriteriaId": "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*", "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDF8A1E-B259-43D0-A56C-8C2BB688A32C", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E8C6528-9100-41D2-88A2-FFEABAB8F86A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC99346-DBF1-4060-8E6B-35D315944ADA", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*", "matchCriteriaId": "88F4A126-B4A6-480A-9DD7-7F68714DFB49", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F900BDD-F094-41A6-9A23-31F53DBA95D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*", "matchCriteriaId": "E25652AB-E243-4C40-BE12-AB53AF52CD61", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*", "matchCriteriaId": "87543FB4-658A-4300-9DC9-836AC1D4BCFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*", "matchCriteriaId": "07B3C659-C31A-4F82-9587-9F8A943F637D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*", "matchCriteriaId": "89FAAD8C-6DD1-408D-849B-0CE707321B13", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEA61ADB-2FEA-459A-BF4F-C55401479107", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_2300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF5F66-636C-4637-96F7-0FA45BB7C64B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3100:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4F55EF-4F2B-499C-8173-12BE32085744", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8921CB70-EE2E-4E18-8E6C-52B505E2D2E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C29793-1142-4506-8C32-3B89227BB3A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DE7FB3-1CAA-4FB1-B5CB-81E7BDD32C5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9921AE2D-F497-47C8-B463-947E230CF4F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_3300x:-:*:*:*:*:*:*:*", "matchCriteriaId": "45C1A897-5FA2-403D-86C2-9D67C5B043A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BE6DAAF-7A5E-4D6C-862A-443647E66432", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "492017EE-C13F-4C40-887F-9C3C9F439898", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E02A9C95-DF12-4816-88C3-6AFC331B8426", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F962DD-90D5-47AB-8ABC-36E925821636", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5400u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B1390DB-9E89-4C57-93F7-06B36EFDE579", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425c:-:*:*:*:*:*:*:*", "matchCriteriaId": "962E91F5-037B-4532-A5DB-FCC01631666F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_3_5425u:-:*:*:*:*:*:*:*", "matchCriteriaId": "74236755-56DA-4245-A07F-DF9817D8F01D", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "99BEE640-381F-449B-ACB1-F1BD255683C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AC4BECA-6023-4225-9685-937E47C67C1F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "88D2C602-8086-4FC4-AE89-0842A453E56E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D777E18-B7ED-42CF-A2C4-87426B04E8EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "237AB35F-1702-418D-8193-F8B387B7F644", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_2700x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0C5EE04-23BC-48E6-A171-D63C8258E317", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3450g:-:*:*:*:*:*:*:*", "matchCriteriaId": "94AB5202-A5A2-479E-B4B0-347C823201AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCDAE070-C41A-4D8C-BE0D-DBD434760749", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3550h:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C6F103-30CC-4738-B489-B12790836B1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3580u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE2EC993-8A65-416B-939F-1C707D596AF9", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9B07D45-5EA5-405E-A649-DADE2451E3EC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600x:-:*:*:*:*:*:*:*", "matchCriteriaId": "09342618-057F-4F49-A43F-352212738F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_3600xt:-:*:*:*:*:*:*:*", "matchCriteriaId": "B156A9F3-E22D-428D-9E84-9D6CD6F3FE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0DA85AB-B5C0-4D99-BB89-FBDA7CC4E97F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0005355A-DA7A-417D-8AF9-F6CC880040BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "1614C8C2-0DDF-464F-BAE5-812CED10CA17", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA92163-5A72-4271-89D4-401C24950F62", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "954500F1-6466-4A1C-8E0C-D759121CEBDC", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94BB2CE6-E989-43EE-B501-0DA6079BA420", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600h:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A5FDA44-978A-4ACC-9A42-00929DFE485B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600hs:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD963142-F19B-42C9-AB46-8F24CD773BE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "85D64E8F-BB90-4425-9980-9D2E2B74E83B", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625c:-:*:*:*:*:*:*:*", "matchCriteriaId": "BAED3E10-E29A-41E8-9758-C0DEEB13D630", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_5_5625u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C16BC515-84AE-432F-853B-822E737C242F", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0D7F33C-F522-4A20-9055-1662178D7F27", "vulnerable": false }, { "criteria": "cpe:2.3:h:amd:ryzen_7_2700u:-:*:*:*:*:*:*:*",