CVE-2023-20526
Vulnerability from cvelistv5
Published
2023-11-14 18:52
Modified
2024-08-02 09:05
Summary
Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:05:36.942Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
          },
          {
            "tags": [
              "vendor-advisory",
              "x_transferred"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "AMD Ryzen\u2122 Threadripper\u2122 2000 Series Processors \u201cColfax\u201d",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "1st Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "2nd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "packageName": "PI",
          "platforms": [
            "x86"
          ],
          "product": "3rd Gen AMD EPYC\u2122 Processors",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 3000",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7002",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "product": "AMD EPYC\u2122  Embedded 7003",
          "vendor": "AMD",
          "versions": [
            {
              "status": "affected",
              "version": "various"
            }
          ]
        }
      ],
      "datePublic": "2023-11-14T17:30:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.\u003cbr\u003e"
            }
          ],
          "value": "Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "PHYSICAL",
            "availabilityImpact": "NONE",
            "baseScore": 1.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-18T18:43:52.998Z",
        "orgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
        "shortName": "AMD"
      },
      "references": [
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002"
        },
        {
          "tags": [
            "vendor-advisory"
          ],
          "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001"
        }
      ],
      "source": {
        "advisory": "AMD-SB-4002, AMD-SB-3002, AMD-SB-5001",
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "b58fc414-a1e4-4f92-9d70-1add41838648",
    "assignerShortName": "AMD",
    "cveId": "CVE-2023-20526",
    "datePublished": "2023-11-14T18:52:41.992Z",
    "dateReserved": "2022-10-27T18:53:39.737Z",
    "dateUpdated": "2024-08-02T09:05:36.942Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-20526\",\"sourceIdentifier\":\"psirt@amd.com\",\"published\":\"2023-11-14T19:15:15.627\",\"lastModified\":\"2024-06-18T19:15:57.873\",\"vulnStatus\":\"Modified\",\"descriptions\":[{\"lang\":\"en\",\"value\":\"Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.\"},{\"lang\":\"es\",\"value\":\"Una validaci\u00f3n de entrada insuficiente en el ASP Bootloader puede permitir que un atacante privilegiado con acceso f\u00edsico exponga el contenido de la memoria ASP, lo que podr\u00eda provocar una p\u00e9rdida de confidencialidad.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\"},\"exploitabilityScore\":0.9,\"impactScore\":3.6},{\"source\":\"psirt@amd.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:H/PR:H/UI:N/S:C/C:L/I:N/A:N\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\",\"baseScore\":1.9,\"baseSeverity\":\"LOW\"},\"exploitabilityScore\":0.3,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7001_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"4BD7B00D-ECD9-419E-B927-7AD293360BB3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6CAD2BB6-29B1-4CCA-A8A5-0FA9AB168803\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7251_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"1053118D-84FB-4126-8558-F731AF578D51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"565383C4-F690-4E3B-8A6A-B7D4ACCFAA05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7261_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"2567B7A7-23AF-4A5E-B5B4-50A15EBF58FA\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71ED05E6-8E69-41B9-9A36-CCE2D59A2603\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7281_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"10630C1F-3EAE-47EE-AD1C-6C35052B1C51\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"805B4FEA-CFB2-429C-818B-9277B6D546C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7301_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"214D44A0-2B4F-4C3B-BC77-3388F60BEE21\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F65FC5B9-0803-4D7F-8EF6-7B6681418596\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7351_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"91DC33A9-7EE5-443F-A195-5739E25880D8\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A5FC951-9FAD-45B4-B7CF-D1A9482507F5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7351p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"E196A8EC-8E17-4394-BBB9-AAC4B773686A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BB78361-9AAD-44BD-8B30-65715FEA4C06\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7371_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"FA6066FB-CE27-447A-B9E3-ECFBB59DF4CC\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA7576CB-A818-47A1-9A0D-6B8FD105FF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7401_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"2F2D9898-5A45-4F76-89F9-A0E0F9B68195\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C05F1EF0-3576-4D47-8704-36E9FAB1D432\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7401p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"D6554840-DD72-4CB7-B72B-40F0EB4AAB5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7451_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"5EB8E56A-20CD-4722-91F8-A4BC9E629F84\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51C8CF00-8FC8-4206-9028-6F104699DE76\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7501_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"17C9FDD3-74A4-4848-B6CE-7861658C3A30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E8BAB73-6F45-49AB-8F00-49A488006F3E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7551_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"B748EBB3-37A9-4F2A-A4A4-AAEEF56BABC0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AAB403A-5A36-4DC3-A187-99127CF77BA7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7551p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"264D28A9-A104-4333-9094-8251FBF00880\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01BE5D42-1C62-4381-89E0-8F3264F696EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7601_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"naplespi_1.0.0.h\",\"matchCriteriaId\":\"02967552-68C0-4111-B05D-BC17EFEF37DD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168076CD-1E6D-4328-AB59-4C1A90735AC4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7232p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"B1EE7BD8-625F-4533-AF43-213A82FCB1FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D55BEF-AFC8-45DC-9401-5DEF374E16C5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7252_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"86A33632-EAAF-4ADF-B07D-CDC9385ED732\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B816918-6CCF-4010-AA16-7BF8A93AD7D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7262_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"1A742A61-4EE8-4C50-887C-9DCD1F7FF1D1\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7262:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FBBFDD3-A85D-43A3-AD67-D69E91C633B6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7272_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"3CC7E22A-C19C-48FC-AE86-A68473B8602E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7272:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F187412-26C2-4D8C-9199-D7CCF49D6520\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7282_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"BD8EAE9B-C9A0-45B4-92A1-E32B41FB662F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7282:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FC5683-F612-4586-8BA3-FB1F66D8868B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"1C49E756-5618-4D8E-81C1-33CD3BC353D6\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0F7CB05E-C4F4-481F-AFB0-9288EBE6DB62\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7302p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"6B4EED49-0DED-45EC-877D-672BBB06BCA7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7302p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A2E0AC0-8BDE-49F8-B067-DB03037921DD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7352_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"8B05A06A-CA4D-4913-B882-4E56B2432D59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7352:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1540CCD-1ED8-4B4E-AD43-7DE2689D9A21\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"E1FA8962-C0BC-4493-AB01-1D0936CE8E1D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"430C9955-0090-4166-8E90-D81C2AA7DE0D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7402p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"8CA0144F-9D9B-4DC1-AE54-B6AC77430900\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7402p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"92EBDDBF-37C2-4D09-B744-F78169B2C1C3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7452_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"75273AB0-F8E2-47D6-8C57-BED9644C780B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7452:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"68ACF30E-62DD-4217-B7F0-4A0FFF47E8EF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"E8E54262-7072-476B-9350-F346245E1201\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49BBC687-5C3C-4843-A028-B8BE29D1E302\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7502p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"310788CD-F880-42FC-A781-4C69B4C1A408\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7502p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"563708A3-7C51-4693-B02D-9A25A639FE42\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7532_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"C2ADCCB2-BE24-45C4-A405-85AF9D87E1F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7532:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDABE45-F529-453C-92DC-BF7747CEEC0E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7542_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"170E0360-4016-4701-A122-04E7D52A2230\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7542:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC94B03B-A7FE-47AE-969D-FFEF278A7A9B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7552_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"6E4C3A17-1330-4715-895C-E504B69CE9CF\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7552:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A6C7497-1B63-490F-B8EA-D9F3CB790952\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7642_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"2B6A231C-DB49-4579-ADC6-4C1BF1070E8F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7642:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EDF8A1E-B259-43D0-A56C-8C2BB688A32C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7662_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"F14E7796-C881-4C3D-9B73-3ADF0F3DDE52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7662:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E8C6528-9100-41D2-88A2-FFEABAB8F86A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7702_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"C323A487-AA20-4BDC-93BE-605030A6605F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AC99346-DBF1-4060-8E6B-35D315944ADA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7702p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"8517C9C4-90C3-4B37-B47E-C9B28EE604FD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7702p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"72C86198-0BD4-42E1-974B-70A49F82C411\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7742_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"25AFCF12-4CE4-4D1B-80F4-FD90C19984EE\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7742:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F4A126-B4A6-480A-9DD7-7F68714DFB49\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f32_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"E0F738BC-5F96-4B78-911F-163EDDCB54D7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f32:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E25652AB-E243-4C40-BE12-AB53AF52CD61\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f52_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"A79B9BFF-8BE6-40C3-B46A-BB9DBCA9F800\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f52:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"87543FB4-658A-4300-9DC9-836AC1D4BCFB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7f72_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"D2E3AD05-0284-4C33-BD07-95B30D1CB018\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7f72:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07B3C659-C31A-4F82-9587-9F8A943F637D\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7h12_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"romepi_1.0.0.d\",\"matchCriteriaId\":\"A44438AB-41BB-4E25-AD79-729857CF8B4D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7h12:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89FAAD8C-6DD1-408D-849B-0CE707321B13\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"0FB69E43-DCB4-432C-9ED3-D7364F75AA58\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F900BDD-F094-41A6-9A23-31F53DBA95D4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"3A775676-D398-43F5-AD5D-C4FD8ECD2AC4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2299ED50-B4D2-4BB3-AD87-56D552B84AE1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"82C4F4E6-2BB3-4CD0-89B3-E234E1DE2222\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4D698D3E-BB05-4C65-90F4-8DAE275CD6A4\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"910DFF12-DF71-444C-89A0-10CFE6A1BAA4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B7B5F0D8-2659-494C-8FB9-50A797CE0CA9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"00C17F69-0E8C-4272-8412-CE33F594E740\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DFCB62-6CDF-4AD2-9265-1887E5780CA5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"36F046AD-A8BC-4BE1-812F-99E096779C77\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F05F9B7A-9777-461E-B88E-96592F87A49E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"4D11A474-6C0F-4B95-85F6-138C98D1F32B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D02B1C69-BAA4-485B-BE22-46BE321F9E4E\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"38DAF4CB-74A0-4404-83F2-00D78E7B5EAB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"45168C28-F506-4D42-92D1-FF1AE03044D9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"258BFA6D-AFF2-4199-A59A-85643DB6A561\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBF0AFED-588A-4EFB-8C90-9280BC3A6720\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"157CD272-1F01-4514-81A2-8B4E7E177C5C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A0A47B-74A1-4731-92A8-BC10FFE58ECF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"3375DF8B-D0D7-4888-8D24-0A1834E4FD2C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52544912-FAA3-4025-A5FD-151B21CEC53B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"EEE0F93E-E95E-4EBC-9B40-2DF1ABBCBFB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8264DF4-47B4-4716-AE89-44AFA870D385\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"32FA4160-368C-46AC-A7DD-623CB8CF1F01\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D07E922F-C1AB-469C-A1C1-9F9E58332DFC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"44F9FCF1-CA75-4688-BD62-487029054E35\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"241E39FF-FE66-444C-A4C2-3D28C45341BE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"C092D5C7-369F-4EED-90FA-10091BB49861\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02D08121-DC57-47D7-8214-23A209F0AF08\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"C4DAD7E6-9D81-4DA7-831A-29ACFC3663F9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E2B13CA-72F4-4CF6-9E12-62E6E9056A14\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"9BEC5185-2AA7-4EF2-925E-B3A1E9229CE7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C474537-3006-41BA-8C3D-5C370E3ACECD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"D54F40EC-C433-4FB6-A07A-8C81FD3E04A7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1766FF1-77A9-4293-B826-F6A8FBD7AFBF\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"48DB2F6F-AF8C-4B1D-A0C1-D6DBCD34D528\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"180B3002-B3C5-48B5-8322-5B64B237C5B9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"F793F124-BC16-48C7-9FB6-4932EE153E31\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"678C5F58-8AE9-46FF-8F01-4CF394C87A2C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"2807BF4F-10B8-470A-8646-A8224E04DCCD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71B9C24B-2C10-4826-A91B-E1C60665FBBE\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"55BF1B99-92BB-4BD7-84DC-BCBF4BFAF234\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9000686A-DC2B-4561-9C32-E90890EB2EBA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"9710AF52-5E45-44CE-88EB-821F538A1692\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02B61B7-7DD3-4164-8D32-EB961E981BC9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"7C1AD7A8-7E0F-4EDD-B93F-D4800D54D776\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88ACBFE2-C462-454E-9481-34BDF42237C8\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"948D4C27-EBB2-4578-BE09-2F237B9B8D59\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE26D1A9-79F1-48B0-854F-84421A261E5C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"934DEED4-7118-435E-AF96-C34EC71D3AE5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"80BEF1BA-4533-40CA-8DC6-FCB6D9A291C4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A50B483-D20C-4BD4-94FA-01B8C9A904D5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"milanpi_1.0.0.5\",\"matchCriteriaId\":\"2BB5D70A-1627-4878-8F12-FB439C2BB2F0\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F44C8195-1621-4327-BBFA-8AFA36BED7AA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2990wx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"summitpi-sp3r2_1.1.0.7\",\"matchCriteriaId\":\"B7AE5260-B45F-4623-B50D-645F4E32A59B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2990wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1B5369B-DFFE-4A84-8894-513AE7FC7C6C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2970wx_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"summitpi-sp3r2_1.1.0.7\",\"matchCriteriaId\":\"1CE0667C-BFD2-4D37-AC09-85C622D74A4E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2970wx:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0A2CE6D-331C-4388-B0D6-EBAA05E87AB3\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2950x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"summitpi-sp3r2_1.1.0.7\",\"matchCriteriaId\":\"03DA6F71-51B4-41EA-B2F2-479D6C564ADB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3964CA7C-996C-43C5-B1A5-14046DAD07BD\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_threadripper_2920x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"summitpi-sp3r2_1.1.0.7\",\"matchCriteriaId\":\"3AD9C120-E6DE-4437-A976-FB07F1F58FBD\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_threadripper_2920x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52C9FEEF-0D0F-40DC-9E98-248F8608B755\"}]}]}],\"references\":[{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-4002\",\"source\":\"psirt@amd.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001\",\"source\":\"psirt@amd.com\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.