8 results (0.012 seconds)

CVSS: 7.5EPSS: 0%CPEs: 114EXPL: 0

13 Aug 2024 — A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html •

CVSS: 6.8EPSS: 0%CPEs: 176EXPL: 0

11 Jul 2023 — A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004 • CWE-203: Observable Discrepancy •

CVSS: 4.7EPSS: 0%CPEs: 340EXPL: 0

14 Feb 2023 — When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure. A flaw was found in HW. When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch, potentially resulting in information disclosure. When SMT is enabled, certain AMD processors may speculatively execute instructions using a targ... • https://security.gentoo.org/glsa/202402-07 •

CVSS: 6.5EPSS: 0%CPEs: 198EXPL: 0

11 May 2022 — An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time. Un atacante con acceso a un hipervisor malicioso puede ser capaz de inferir los valores de los datos usados en un huésped SEV en CPUs AMD mediante la monitorización de los valores del texto cifrado a lo largo del tiempo • http://www.openwall.com/lists/oss-security/2022/08/08/6 • CWE-203: Observable Discrepancy •

CVSS: 5.5EPSS: 0%CPEs: 214EXPL: 0

04 Feb 2022 — AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor. Los procesadores AMD EPYC™ contienen una vulnerabilidad de divulgación de información en la virtualización cifrada segura con estado cifrado (SEV-ES) y la virtualizac... • http://www.openwall.com/lists/oss-security/2022/08/08/6 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •

CVSS: 8.4EPSS: 0%CPEs: 210EXPL: 0

10 Dec 2021 — A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM). Un Hypervisor malicioso en conjunción con un proceso de atacante no privilegiado dentro de una máquina virtual invitada SEV/SEV-ES puede producir un fallo en el vaciado de la Memoria Intermedia de Traducción (TLB), resultando en un comportamiento no esperado dentro de la máquina vir... • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1023 •

CVSS: 9.0EPSS: 0%CPEs: 65EXPL: 0

13 May 2021 — In the AMD SEV/SEV-ES feature, memory can be rearranged in the guest address space that is not detected by the attestation mechanism which could be used by a malicious hypervisor to potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor. En la funcionalidad SEV/SEV-ES de AMD, la memoria puede ser reorganizada en el espacio de direcciones del invitado que no es detectado por el mecanismo de certificación que podría ser util... • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 9.0EPSS: 0%CPEs: 65EXPL: 0

13 May 2021 — The lack of nested page table protection in the AMD SEV/SEV-ES feature could potentially lead to arbitrary code execution within the guest VM if a malicious administrator has access to compromise the server hypervisor. La falta de protección de tablas de páginas anidadas en la funcionalidad SEV/SEV-ES de AMD, podría potencialmente conllevar a una ejecución de código arbitraria dentro de la Máquina Virtual invitada si un administrador malicioso tiene acceso para comprometer el hypervisor del servidor • https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1004 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •