5 results (0.016 seconds)

CVSS: 6.5EPSS: 0%CPEs: 176EXPL: 0

A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004 • CWE-203: Observable Discrepancy •

CVSS: 4.7EPSS: 0%CPEs: 340EXPL: 0

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch, potentially resulting in information disclosure. • https://security.gentoo.org/glsa/202402-07 https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-1045 https://access.redhat.com/security/cve/CVE-2022-27672 https://bugzilla.redhat.com/show_bug.cgi?id=2174765 •

CVSS: 6.5EPSS: 0%CPEs: 198EXPL: 0

An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time. Un atacante con acceso a un hipervisor malicioso puede ser capaz de inferir los valores de los datos usados en un huésped SEV en CPUs AMD mediante la monitorización de los valores del texto cifrado a lo largo del tiempo • http://www.openwall.com/lists/oss-security/2022/08/08/6 https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1033 • CWE-203: Observable Discrepancy •

CVSS: 5.5EPSS: 0%CPEs: 214EXPL: 0

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor. Los procesadores AMD EPYC™ contienen una vulnerabilidad de divulgación de información en la virtualización cifrada segura con estado cifrado (SEV-ES) y la virtualización cifrada segura con paginación anidada segura (SEV-SNP). Un atacante local autenticado podría potencialmente explotar esta vulnerabilidad conllevando a una filtración de los datos del huésped por parte del hipervisor malicioso • http://www.openwall.com/lists/oss-security/2022/08/08/6 https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.4EPSS: 0%CPEs: 210EXPL: 0

A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM). Un Hypervisor malicioso en conjunción con un proceso de atacante no privilegiado dentro de una máquina virtual invitada SEV/SEV-ES puede producir un fallo en el vaciado de la Memoria Intermedia de Traducción (TLB), resultando en un comportamiento no esperado dentro de la máquina virtual (VM) • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023 •