![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-20578
https://notcve.org/view.php?id=CVE-2023-20578
13 Aug 2024 — A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2023-20575
https://notcve.org/view.php?id=CVE-2023-20575
11 Jul 2023 — A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004 • CWE-203: Observable Discrepancy •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2022-27672 – kernel: AMD: Cross-Thread Return Address Predictions
https://notcve.org/view.php?id=CVE-2022-27672
14 Feb 2023 — When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch, potentially resulting in information disclosure. When SMT is enabled, certain AMD processors may speculatively execute instructions using a targ... • https://security.gentoo.org/glsa/202402-07 •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-46744
https://notcve.org/view.php?id=CVE-2021-46744
11 May 2022 — An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time. Un atacante con acceso a un hipervisor malicioso puede ser capaz de inferir los valores de los datos usados en un huésped SEV en CPUs AMD mediante la monitorización de los valores del texto cifrado a lo largo del tiempo • http://www.openwall.com/lists/oss-security/2022/08/08/6 • CWE-203: Observable Discrepancy •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2020-12966
https://notcve.org/view.php?id=CVE-2020-12966
04 Feb 2022 — AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor. Los procesadores AMD EPYC™ contienen una vulnerabilidad de divulgación de información en la virtualización cifrada segura con estado cifrado (SEV-ES) y la virtualizac... • http://www.openwall.com/lists/oss-security/2022/08/08/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
![](/assets/img/cve_300x82_sin_bg.png)
CVE-2021-26340
https://notcve.org/view.php?id=CVE-2021-26340
10 Dec 2021 — A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM). Un Hypervisor malicioso en conjunción con un proceso de atacante no privilegiado dentro de una máquina virtual invitada SEV/SEV-ES puede producir un fallo en el vaciado de la Memoria Intermedia de Traducción (TLB), resultando en un comportamiento no esperado dentro de la máquina vir... • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023 •