fkie_cve-2022-23830
Vulnerability from fkie_nvd
Published
2023-11-14 19:15
Modified
2024-11-21 06:49
Severity ?
1.9 (Low) - CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
5.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Summary
SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.
References
Impacted products
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EB9C77FA-9807-4233-BE30-9275ADEF6930", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654p:-:*:*:*:*:*:*:*", matchCriteriaId: "C150CC54-2F64-48E7-B996-F06247114BC4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9654_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4960A6A2-CEAB-4970-A1B8-9ABA220ACBE6", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9654:-:*:*:*:*:*:*:*", matchCriteriaId: "84209250-5078-4E8E-8532-98F652C12D79", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9634_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4ADE7FD0-2BE7-4928-A556-5831C7CEA16D", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9634:-:*:*:*:*:*:*:*", matchCriteriaId: "4C6C0B65-0C8C-4BCE-9B40-39B2EB5E5EA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E95DA74-848F-4036-9A79-35D29ECE3D09", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554p:-:*:*:*:*:*:*:*", matchCriteriaId: "A2BD9C75-AA02-47C1-94C7-BA5187B8CDF0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9554_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93A27BB9-F55D-43A4-A439-5D5773057B3B", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9554:-:*:*:*:*:*:*:*", matchCriteriaId: "A95FCDE4-82EF-4C54-A85D-960B36A46DD0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9534_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A46BF53F-F940-44A1-9E0B-068677C4AC90", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9534:-:*:*:*:*:*:*:*", matchCriteriaId: "E8FC239C-6B12-4F7C-A725-9D66AD39F7F6", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9474f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "ECB7FCFC-A27A-4656-967A-517F591BB3C8", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9474f:-:*:*:*:*:*:*:*", matchCriteriaId: "A1520823-129F-4F48-932B-1CA77D3446CC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "90030672-613B-4252-922D-7F26D2FCA877", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454p:-:*:*:*:*:*:*:*", matchCriteriaId: "932E47BF-3831-4D72-9F26-89CA591692B8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9454_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EFBA5F7-E9BE-4EDB-BD4E-D4316B0D945A", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9454:-:*:*:*:*:*:*:*", matchCriteriaId: "F7FDDC36-A96D-419F-A4B5-8AEF9D5FEBE5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9374f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F21FC32C-DDA2-4804-9EDA-C9BEB18C9AC6", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9374f:-:*:*:*:*:*:*:*", matchCriteriaId: "14BA8C50-B57A-4F6D-860B-790BD39249B0", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7DAF542F-040B-4681-BCEA-E4F1F99ABD00", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354p:-:*:*:*:*:*:*:*", matchCriteriaId: "EF0F7101-1B8B-454B-879F-8635CB16D5C7", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9354_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C3710FCB-CAF1-4BFE-A984-0C46BA27F9BF", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9354:-:*:*:*:*:*:*:*", matchCriteriaId: "7A152B84-4935-4517-BD9D-37471C281BDA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9334_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8EC0604A-D5DA-4966-AF48-EBAB46F1BD61", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9334:-:*:*:*:*:*:*:*", matchCriteriaId: "6B1047C6-4627-4520-AFF7-5A0A623336F9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9274f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9E087AEC-06E1-4A95-A644-7587331DEE55", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9274f:-:*:*:*:*:*:*:*", matchCriteriaId: "54EE0A4A-AA13-49CE-8825-407AD6B16B13", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9254_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "8ED6C058-3CE9-4E68-8FBF-19942D6678F6", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9254:-:*:*:*:*:*:*:*", matchCriteriaId: "AFDF951D-9B67-49CE-AD4A-B1052A484E65", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9224_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "53BDC783-1492-4A3A-B75E-DA98B366D43D", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9224:-:*:*:*:*:*:*:*", matchCriteriaId: "B085546F-4791-4096-A019-738A37353165", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9174f_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E8937722-6B70-42F4-913F-55881066C571", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9174f:-:*:*:*:*:*:*:*", matchCriteriaId: "D7811418-4B63-4CCA-B81F-379FF0277673", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9124_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "A3857E72-56F0-426D-A9AD-60B5711CE5DB", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9124:-:*:*:*:*:*:*:*", matchCriteriaId: "2761489D-AABE-4ADD-AE5B-B26C4424F18A", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9684x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "67C3F794-B9D2-4BDA-ABB4-397C8B074B30", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9684x:-:*:*:*:*:*:*:*", matchCriteriaId: "71A34603-6EB8-4D75-9391-8ADC35EA5EFE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9384x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BDC6D4D7-F7DE-4B35-AE48-C20A86CB56B2", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9384x:-:*:*:*:*:*:*:*", matchCriteriaId: "E6DC6F07-2E27-48C3-BD60-81496C2D3C62", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9184x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "BB1C6B4C-0A4A-4F47-B22A-9B070C3834E7", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9184x:-:*:*:*:*:*:*:*", matchCriteriaId: "4C3085B2-AFDA-4C34-A2B6-40D599F7E907", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6521FCD8-ACD3-4EFC-881D-C82AFBB57100", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754:-:*:*:*:*:*:*:*", matchCriteriaId: "4EF0ED85-2FCF-4DCB-9C7F-0B5EC5EC574C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9754s_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "93096670-AB65-461B-AD8C-725B525AB2D0", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9754s:-:*:*:*:*:*:*:*", matchCriteriaId: "E74F229A-FDBD-4C3D-BE0B-9193E6E560ED", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_9734_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1A7CE606-63D1-488C-BCCE-37098C57BBB9", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_9734:-:*:*:*:*:*:*:*", matchCriteriaId: "DE0954B5-9B6E-4C0E-905B-1E4B3FD50B04", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "CE8D62F4-A1FE-4865-ACE3-22E621873085", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534p:-:*:*:*:*:*:*:*", matchCriteriaId: "DEABF567-1E41-4FD2-876E-7D2689A01D51", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8534pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9A95DADE-44C0-4A3B-8ED9-9F32CEFE28C4", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8534pn:-:*:*:*:*:*:*:*", matchCriteriaId: "9AF46284-ED2F-45F9-A4E8-221593FB7F49", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "04468F0E-494D-43F5-898A-FBBF60CBDEF5", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434p:-:*:*:*:*:*:*:*", matchCriteriaId: "5323D02F-E25A-460D-8DA1-F8C72E635E53", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8434pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "92561B70-9884-461C-B493-437BC64DE56A", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8434pn:-:*:*:*:*:*:*:*", matchCriteriaId: "A9241D42-1771-4528-8436-EE3FDE20C042", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "229D581F-A875-4E50-9C70-4978F4213110", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324p:-:*:*:*:*:*:*:*", matchCriteriaId: "46C7CC4B-3EC8-42D7-9AE9-F887D4DDF046", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8324pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3A239F9E-D957-43B9-BE84-925E034C7D1B", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8324pn:-:*:*:*:*:*:*:*", matchCriteriaId: "F4886768-DAFF-481E-894F-F8E816B36EB3", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "86181C40-CBE2-4AAC-A853-F36372372D41", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224p:-:*:*:*:*:*:*:*", matchCriteriaId: "DF4C36B4-CC5F-4A66-9294-71E0531E80F5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8224pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DAF54712-9455-453E-82C6-A64209D2F1D8", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8224pn:-:*:*:*:*:*:*:*", matchCriteriaId: "15981CBF-CB09-416E-AB31-54D650182EBD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B7340146-AF63-444A-915D-DC78E509C8D8", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124p:-:*:*:*:*:*:*:*", matchCriteriaId: "E828D3FB-9EF3-40C4-B338-7BCF73C6EF37", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8124pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0BF77B4F-61B5-4F13-9724-A085329D6827", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8124pn:-:*:*:*:*:*:*:*", matchCriteriaId: "B24580CA-3A31-4775-AD72-DF1DB6CB84C2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E35B55E0-0EBD-4232-B24D-D8D9B10540A5", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024p:-:*:*:*:*:*:*:*", matchCriteriaId: "29BACF50-D9DB-4207-BF61-CACDCC3870E9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_8024pn_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "C00B3DBF-DF5C-4B22-B945-9B2A0E04946C", versionEndExcluding: "genoapi_1.0.0.1", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_8024pn:-:*:*:*:*:*:*:*", matchCriteriaId: "364B9EAB-E113-4370-ACDC-92BFD54BEF88", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB3B006E-3930-4DD8-9E4E-1B520DB45535", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*", matchCriteriaId: "4F900BDD-F094-41A6-9A23-31F53DBA95D4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30013429-BC7F-4A52-A7AB-49FE91F6C5CE", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*", matchCriteriaId: "2299ED50-B4D2-4BB3-AD87-56D552B84AE1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EA3D1AF4-E79F-4B8B-ACD1-286A1CF354E1", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*", matchCriteriaId: "4D698D3E-BB05-4C65-90F4-8DAE275CD6A4", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "30C1D9D9-875C-4841-9B32-48344DEA077D", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663p:-:*:*:*:*:*:*:*", matchCriteriaId: "B7B5F0D8-2659-494C-8FB9-50A797CE0CA9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "3E8D2D9C-20CD-48C4-AA06-365D78250058", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*", matchCriteriaId: "A7DFCB62-6CDF-4AD2-9265-1887E5780CA5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "285125AF-8AA5-437E-AF78-F2625D9136A2", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643p:-:*:*:*:*:*:*:*", matchCriteriaId: "F05F9B7A-9777-461E-B88E-96592F87A49E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7773x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6F6E8DC7-2E57-490D-B32D-E1F33BB36839", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7773x:-:*:*:*:*:*:*:*", matchCriteriaId: "D02B1C69-BAA4-485B-BE22-46BE321F9E4E", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "D7FAFC36-0BCA-43CE-B22B-65C98C748315", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*", matchCriteriaId: "98E1D79D-0CB0-4FD9-8A82-27CDFBFE07B2", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7573x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4C9015CD-8EDF-4D8E-A582-D04DD2425887", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7573x:-:*:*:*:*:*:*:*", matchCriteriaId: "237FB33B-BF08-4E3E-8E83-EB0AD2F12A4B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F4680D11-F4E7-4F76-93AB-EF6183D024A2", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*", matchCriteriaId: "EBF0AFED-588A-4EFB-8C90-9280BC3A6720", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DB47A44F-26AF-42DC-B388-C2A84B95C8FE", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*", matchCriteriaId: "77A0A47B-74A1-4731-92A8-BC10FFE58ECF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "204719EA-FF4B-4674-B270-1790035594A5", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*", matchCriteriaId: "52544912-FAA3-4025-A5FD-151B21CEC53B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "5F523DAE-2F55-4822-92A1-218AA886313B", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*", matchCriteriaId: "F8264DF4-47B4-4716-AE89-44AFA870D385", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7473x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "6AC49F14-804A-480A-BA66-373C00606F98", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7473x:-:*:*:*:*:*:*:*", matchCriteriaId: "D07E922F-C1AB-469C-A1C1-9F9E58332DFC", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "B12BD5A2-3A94-4016-BDE1-F268AB8A142A", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*", matchCriteriaId: "241E39FF-FE66-444C-A4C2-3D28C45341BE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "1C61B330-4DD0-47E7-ACEC-0871EB497DF4", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*", matchCriteriaId: "02D08121-DC57-47D7-8214-23A209F0AF08", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "9C0E4DD8-E76E-4938-9680-64C70A2FE378", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*", matchCriteriaId: "8E2B13CA-72F4-4CF6-9E12-62E6E9056A14", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "AA9F63C2-A774-4B4C-BDD4-1F374AABCC81", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*", matchCriteriaId: "4C474537-3006-41BA-8C3D-5C370E3ACECD", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "4FCBCFE9-D650-4149-871D-4F4597198C6C", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*", matchCriteriaId: "D1766FF1-77A9-4293-B826-F6A8FBD7AFBF", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7373x_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "E88129DB-E22D-4AB3-8A0C-4F067711C767", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7373x:-:*:*:*:*:*:*:*", matchCriteriaId: "180B3002-B3C5-48B5-8322-5B64B237C5B9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "DBE8BBCE-3D9F-4F8E-AEB8-1FCBA3FF0D87", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*", matchCriteriaId: "678C5F58-8AE9-46FF-8F01-4CF394C87A2C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "33CAD962-9D64-430A-A1DC-15B05B4670F0", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*", matchCriteriaId: "71B9C24B-2C10-4826-A91B-E1C60665FBBE", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F2FEC040-4236-4E6D-85D5-BB52E5A81B5B", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*", matchCriteriaId: "9000686A-DC2B-4561-9C32-E90890EB2EBA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "7A9166CC-1C29-430F-B766-7408B3F47855", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*", matchCriteriaId: "B02B61B7-7DD3-4164-8D32-EB961E981BC9", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "91DAAC8F-AF6C-4146-BCFE-1DCE96D49644", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303p:-:*:*:*:*:*:*:*", matchCriteriaId: "88ACBFE2-C462-454E-9481-34BDF42237C8", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7303_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "EEAE9F6D-54F8-46B6-BB04-6EA9E46CE742", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7303:-:*:*:*:*:*:*:*", matchCriteriaId: "EE26D1A9-79F1-48B0-854F-84421A261E5C", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "0218786D-D198-44BE-9CA2-FCD1B622BD9E", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*", matchCriteriaId: "7F98FF1A-3A2B-4CED-AEA2-9C4F2AC2D8C1", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203p_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "F21B87C3-72D1-4CEC-8D63-58E38C741AA1", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203p:-:*:*:*:*:*:*:*", matchCriteriaId: "4A50B483-D20C-4BD4-94FA-01B8C9A904D5", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:amd:epyc_7203_firmware:*:*:*:*:*:*:*:*", matchCriteriaId: "FB0AE5AB-0490-453A-9D27-81DE5F08CE1C", versionEndExcluding: "milanpi_1.0.0.a", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:amd:epyc_7203:-:*:*:*:*:*:*:*", matchCriteriaId: "F44C8195-1621-4327-BBFA-8AFA36BED7AA", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity.", }, { lang: "es", value: "Es posible que la configuración de SMM no sea inmutable, como se esperaba, cuando SNP está habilitado, lo que genera una posible pérdida limitada de la integridad de la memoria del huésped.", }, ], id: "CVE-2022-23830", lastModified: "2024-11-21T06:49:20.293", metrics: { cvssMetricV31: [ { cvssData: { attackComplexity: "HIGH", attackVector: "LOCAL", availabilityImpact: "NONE", baseScore: 1.9, baseSeverity: "LOW", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "HIGH", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 0.5, impactScore: 1.4, source: "psirt@amd.com", type: "Secondary", }, { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "NONE", baseScore: 5.3, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "LOW", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", version: "3.1", }, exploitabilityScore: 3.9, impactScore: 1.4, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2023-11-14T19:15:10.570", references: [ { source: "psirt@amd.com", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "psirt@amd.com", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002", }, { source: "af854a3a-2127-422b-91ae-364da2661108", url: "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-5001", }, ], sourceIdentifier: "psirt@amd.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Log in or create an account to share your comment.
Security Advisory comment format.
This schema specifies the format of a comment related to a security advisory.
Title of the comment
Description of the comment
Loading…
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.