3 results (0.001 seconds)

CVSS: -EPSS: 0%CPEs: 8EXPL: 0

Improper Access Control in System Management Mode (SMM) may allow an attacker access to the SPI flash potentially leading to arbitrary code execution. Un control de acceso inadecuado en el modo de administración del sistema (SMM) puede permitir que un atacante acceda a la memoria flash SPI, lo que podría provocar la ejecución de código arbitrario. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-7009 •

CVSS: -EPSS: 0%CPEs: 2EXPL: 0

Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity. Debido a un error de código en Secure_TSC, el firmware SEV puede permitir que un atacante con altos privilegios haga que un invitado observe un TSC incorrecto cuando Secure TSC está habilitado, lo que podría provocar una pérdida de integridad del invitado. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 •

CVSS: 4.4EPSS: 0%CPEs: 2EXPL: 0

Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests. No inicializar la memoria en el firmware SEV puede permitir que un atacante privilegiado acceda a datos obsoletos de otros invitados. A flaw was found in some AMD CPUs where the guest message responses have not been zero-initialized. This issue may allow a local attacker with the ability to run arbitrary code on a container or virtual machine to discover sensitive information contained in the host system's memory. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 https://access.redhat.com/security/cve/CVE-2023-31346 https://bugzilla.redhat.com/show_bug.cgi?id=2250458 • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •