gsd-2023-20588
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 
Aliases
Aliases



{
  "GSD": {
    "alias": "CVE-2023-20588",
    "id": "GSD-2023-20588"
  },
  "gsd": {
    "metadata": {
      "exploitCode": "unknown",
      "remediation": "unknown",
      "reportConfidence": "confirmed",
      "type": "vulnerability"
    },
    "osvSchema": {
      "aliases": [
        "CVE-2023-20588"
      ],
      "details": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n",
      "id": "GSD-2023-20588",
      "modified": "2023-12-13T01:20:28.280248Z",
      "schema_version": "1.4.0"
    }
  },
  "namespaces": {
    "cve.org": {
      "CVE_data_meta": {
        "ASSIGNER": "psirt@amd.com",
        "ID": "CVE-2023-20588",
        "STATE": "PUBLIC"
      },
      "affects": {
        "vendor": {
          "vendor_data": [
            {
              "product": {
                "product_data": [
                  {
                    "product_name": "EPYC\u2122 7001 Processors",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "status": "affected",
                                "version": "various "
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Athlon\u2122 3000 Series Processors with Radeon\u2122 Graphics ",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "status": "affected",
                                "version": "various "
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Ryzen\u2122 3000 Series Processors with Radeon\u2122 Graphics",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "status": "affected",
                                "version": "various "
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Athlon\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics ",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "status": "affected",
                                "version": "Various "
                              }
                            ]
                          }
                        }
                      ]
                    }
                  },
                  {
                    "product_name": "Ryzen\u2122 PRO 3000 Series Processors with Radeon\u2122 Vega Graphics",
                    "version": {
                      "version_data": [
                        {
                          "version_value": "not down converted",
                          "x_cve_json_5_version_data": {
                            "defaultStatus": "affected",
                            "versions": [
                              {
                                "status": "affected",
                                "version": "various "
                              }
                            ]
                          }
                        }
                      ]
                    }
                  }
                ]
              },
              "vendor_name": "AMD"
            }
          ]
        }
      },
      "data_format": "MITRE",
      "data_type": "CVE",
      "data_version": "4.0",
      "description": {
        "description_data": [
          {
            "lang": "eng",
            "value": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n"
          }
        ]
      },
      "generator": {
        "engine": "Vulnogram 0.1.0-dev"
      },
      "problemtype": {
        "problemtype_data": [
          {
            "description": [
              {
                "lang": "eng",
                "value": "n/a"
              }
            ]
          }
        ]
      },
      "references": {
        "reference_data": [
          {
            "name": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007",
            "refsource": "MISC",
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
          },
          {
            "name": "https://www.debian.org/security/2023/dsa-5480",
            "refsource": "MISC",
            "url": "https://www.debian.org/security/2023/dsa-5480"
          },
          {
            "name": "https://www.debian.org/security/2023/dsa-5492",
            "refsource": "MISC",
            "url": "https://www.debian.org/security/2023/dsa-5492"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/25/3",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/25/4",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
          },
          {
            "name": "http://xenbits.xen.org/xsa/advisory-439.html",
            "refsource": "MISC",
            "url": "http://xenbits.xen.org/xsa/advisory-439.html"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/25/5",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/25/8",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/25/7",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/26/5",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/26/8",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/26/9",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/09/27/1",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/03/14",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/03/9",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/03/15",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/03/12",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/03/13",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/03/16",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/04/1",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/04/2",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/04/4",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
          },
          {
            "name": "http://www.openwall.com/lists/oss-security/2023/10/04/3",
            "refsource": "MISC",
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
          },
          {
            "name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/",
            "refsource": "MISC",
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
          },
          {
            "name": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html",
            "refsource": "MISC",
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
          }
        ]
      },
      "source": {
        "advisory": "AMD-SB-7007",
        "discovery": "UNKNOWN"
      }
    },
    "nvd.nist.gov": {
      "cve": {
        "configurations": [
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FA6FEEC2-9F11-4643-8827-749718254FED",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:debian:debian_linux:12.0:*:*:*:*:*:*:*",
                    "matchCriteriaId": "46D69DCC-AE4D-4EA5-861C-D60951444C6C",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5FB895BB-AEA5-4A4E-A9DE-EAD48656187D",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9BB78361-9AAD-44BD-8B30-65715FEA4C06",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7401p_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "23D64F03-2F90-490B-844B-5F0F08B49294",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7401p:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A2E41A87-7A39-4BB2-88E4-16DF0D81BFD2",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7551p_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "ED76988B-0245-4C25-876C-CACC57B04B8D",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7551p:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "01BE5D42-1C62-4381-89E0-8F3264F696EC",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5B92B63F-3C30-4C00-9734-37CCA865FED9",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "565383C4-F690-4E3B-8A6A-B7D4ACCFAA05",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7261_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "49CEC694-DF98-47C7-8C7B-0A26EDC413BA",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7261:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "71ED05E6-8E69-41B9-9A36-CCE2D59A2603",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A4847AB9-1A77-46BD-9236-FE8FFC4670B5",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "805B4FEA-CFB2-429C-818B-9277B6D546C3",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CE35B376-F439-428B-A299-CBEEE0BEFF3E",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F65FC5B9-0803-4D7F-8EF6-7B6681418596",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "014AE81A-ACEE-4E0A-A3FF-412DF86AE00C",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8A5FC951-9FAD-45B4-B7CF-D1A9482507F5",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7371_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1AB8E11E-5816-4ABB-849F-E10C1CFB39ED",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7371:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FA7576CB-A818-47A1-9A0D-6B8FD105FF08",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7401_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F08A2432-6FCE-4579-89FE-EB0348F1BE8B",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7401:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C05F1EF0-3576-4D47-8704-36E9FAB1D432",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7451_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9C952A84-3DA2-448F-85AC-573C270C312D",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7451:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "51C8CF00-8FC8-4206-9028-6F104699DE76",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7501_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "F1B0CC20-FF43-4341-90BE-FA365CC4E53B",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7501:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "4E8BAB73-6F45-49AB-8F00-49A488006F3E",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7551_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "7FE69C69-9D13-4DF9-A5F2-69435598CA8B",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7551:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1AAB403A-5A36-4DC3-A187-99127CF77BA7",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7571_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "99013A91-F504-4EB4-8904-7E551573AF49",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7571:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E3CF0651-A320-40D1-986F-D2790488929E",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:epyc_7601_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D8480358-5313-4308-90F7-F93D9B11C66C",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:epyc_7601:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "168076CD-1E6D-4328-AB59-4C1A90735AC4",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400g_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D403DB4C-6053-41D1-9A69-6B2BEB3ACD40",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400g:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "43C5E75B-136B-4A60-9C2C-84D9C78C0453",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_5_3400g_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "5AC21C1E-D4E7-424F-A284-BBE94194B43C",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_5_3400g:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AF3EDC73-2517-4EBF-B160-85266304D866",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3400ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6DE15998-C424-4A1A-81DB-C4E15B0DF7B8",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3400ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2C6A9017-FE60-4087-AA9D-AFB4E444E884",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350g_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "40933267-3CEF-417E-BE95-37B562F37E78",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350g:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3D242085-9B1A-4125-8070-50505531EECE",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_5_pro_3350ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C9724784-3A56-4175-9829-796CF687CA09",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_5_pro_3350ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "055F87B8-FD74-44CC-A063-84E0BA2E8136",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200g_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E0CF4C3B-337D-44ED-8544-A3D55AB1E62E",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200g:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "C61CD3C7-E080-4C11-81BC-8D2A5D4F140C",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_3_3200g_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EAFFAD03-CEE3-4C35-B6D2-627004A22934",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_3_3200g:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "926812AD-94F0-4CB8-9890-EAB11FDC1804",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_3_3200ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B2BB6B36-892D-434B-B590-6BEAFD4037BC",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_3_3200ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "8A9E5D46-DB87-4420-9AC6-2ABCB0119E01",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:ryzen_3_pro_3200ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EF105508-6252-4101-92B5-ECA9022D4720",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:ryzen_3_pro_3200ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "2BE83C48-571F-4BD6-ABE3-2B14ED510D13",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:athlon_pro_300ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "52DFA8C8-AD16-45B1-934F-AEE78C51DDAC",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:athlon_pro_300ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6F521757-7ABC-4CEB-AD06-2FD738216E8E",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:athlon_gold_3150ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "9832717E-8322-4548-B6C7-DE662D2B05AA",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:athlon_gold_3150ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "11D12DB6-A9E9-4BEA-BC80-D6672A3383CD",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "D689C088-F1F1-4368-B6AE-75D3F9582FB1",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E09DC414-96EE-478E-847C-7ACB5915659B",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:athlon_gold_3150g_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FD375C2E-B976-4DAE-BF89-EFED1482DB28",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:athlon_gold_3150g:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6AE68ECE-5298-4BC1-AC24-5CF613389CDC",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:athlon_gold_pro_3150g_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "420E8314-35B8-4A12-AD42-3914EBA51D4D",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:athlon_gold_pro_3150g:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "EE0FB0AF-E942-4257-A9F2-8077A753A169",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:athlon_silver_3050ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "50F48D3D-C024-45F8-A299-322FB62EF6F4",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:athlon_silver_3050ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CD0332AB-3568-4AF7-9738-3CF2923C6DDA",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:amd:athlon_silver_pro_3125ge_firmware:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "6D7122B9-4664-492C-8440-CE0C0AADAD4C",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              },
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:h:amd:athlon_silver_pro_3125ge:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "368AD9F8-E7E3-4316-9671-7305FDD3D285",
                    "vulnerable": false
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ],
            "operator": "AND"
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:xen:xen:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BFA1950D-1D9F-4401-AA86-CF3028EFD286",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
                    "matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B8EDB836-4E6A-4B71-B9B2-AA3E03E0F646",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          },
          {
            "nodes": [
              {
                "cpeMatch": [
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_10_1507:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "0FA29853-AA80-4D69-B5B2-09C29B73964A",
                    "versionEndExcluding": "10.0.10240.20345",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_10_1607:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "1B72F8B2-FE1A-44FC-8534-66B016C3C3DC",
                    "versionEndExcluding": "10.0.14393.6529",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_10_1809:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "412DCA62-8009-40C3-B76C-F3791104F0C8",
                    "versionEndExcluding": "10.0.17763.5206",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_10_21h2:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "FD5A8AEC-6CE1-4AE3-B877-5F5F7303CAA2",
                    "versionEndExcluding": "10.0.19044.3803",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_10_22h2:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "E59E6692-980B-435A-B9F3-AA00939E8D97",
                    "versionEndExcluding": "10.0.19045.3803",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_11_21h2:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "BC62CCFB-C4C4-4CD1-A291-9587375FE3C6",
                    "versionEndExcluding": "10.0.22000.2652",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_11_22h2:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "11093E57-782B-4049-AFB2-AAFCFB4A8FF6",
                    "versionEndExcluding": "10.0.22621.2861",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_11_23h2:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "3E712F1D-26F9-4E19-B012-D7F0A92D59ED",
                    "versionEndExcluding": "10.0.22631.2861",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:*:*",
                    "matchCriteriaId": "5F422A8C-2C4E-42C8-B420-E0728037E15C",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*",
                    "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*",
                    "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*",
                    "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_server_2016:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "AC76402C-20E3-4A90-B106-A2A9B61621CA",
                    "versionEndExcluding": "10.0.14393.6529",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "B17A84AC-1AB0-416D-8F7D-8183980AEF25",
                    "versionEndExcluding": "10.0.17763.5206",
                    "vulnerable": true
                  },
                  {
                    "criteria": "cpe:2.3:o:microsoft:windows_server_2022_23h2:*:*:*:*:*:*:*:*",
                    "matchCriteriaId": "28E51B68-6AE4-4AF2-A7D3-7728E5D314D7",
                    "versionEndExcluding": "10.0.25398.584",
                    "vulnerable": true
                  }
                ],
                "negate": false,
                "operator": "OR"
              }
            ]
          }
        ],
        "descriptions": [
          {
            "lang": "en",
            "value": "\nA division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality.\u00a0\n\n\n\n\n\n\n\n"
          },
          {
            "lang": "es",
            "value": "Un error de divisi\u00f3n por cero en algunos procesadores AMD puede potencialmente devolver datos especulativos que resulten en una p\u00e9rdida de confidencialidad."
          }
        ],
        "id": "CVE-2023-20588",
        "lastModified": "2024-04-01T15:45:59.377",
        "metrics": {
          "cvssMetricV31": [
            {
              "cvssData": {
                "attackComplexity": "LOW",
                "attackVector": "LOCAL",
                "availabilityImpact": "NONE",
                "baseScore": 5.5,
                "baseSeverity": "MEDIUM",
                "confidentialityImpact": "HIGH",
                "integrityImpact": "NONE",
                "privilegesRequired": "LOW",
                "scope": "UNCHANGED",
                "userInteraction": "NONE",
                "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
                "version": "3.1"
              },
              "exploitabilityScore": 1.8,
              "impactScore": 3.6,
              "source": "nvd@nist.gov",
              "type": "Primary"
            }
          ]
        },
        "published": "2023-08-08T18:15:11.653",
        "references": [
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/3"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/4"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/5"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/7"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/25/8"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/5"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/8"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/26/9"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/09/27/1"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/12"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/13"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/14"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/15"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/16"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/03/9"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/1"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/2"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/3"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/10/04/4"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "http://xenbits.xen.org/xsa/advisory-439.html"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List",
              "Third Party Advisory"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AGZCACEHT6ZZZGG36QQMGROBM4FLWYJX/"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DIOYP4ZOBML4RCUM3MHRFZUQL445MZM3/"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Mailing List"
            ],
            "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJTUVYZMP6BNF342DS3W7XGOGXC6JPN5/"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Vendor Advisory"
            ],
            "url": "https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7007"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5480"
          },
          {
            "source": "psirt@amd.com",
            "tags": [
              "Third Party Advisory"
            ],
            "url": "https://www.debian.org/security/2023/dsa-5492"
          }
        ],
        "sourceIdentifier": "psirt@amd.com",
        "vulnStatus": "Analyzed",
        "weaknesses": [
          {
            "description": [
              {
                "lang": "en",
                "value": "CWE-369"
              }
            ],
            "source": "nvd@nist.gov",
            "type": "Primary"
          }
        ]
      }
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.