50 results (0.010 seconds)

CVSS: 7.5EPSS: 0%CPEs: 64EXPL: 0

13 Aug 2024 — Improper re-initialization of IOMMU during the DRTM event may permit an untrusted platform configuration to persist, allowing an attacker to read or modify hypervisor memory, potentially resulting in loss of confidentiality, integrity, and availability. Improper re-initialization of IOMMU during the DRTM event may permit an untrusted platform configuration to persist, allowing an attacker to read or modify hypervisor memory, potentially resulting in loss of confidentiality, integrity, and availability. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html • CWE-665: Improper Initialization •

CVSS: 7.5EPSS: 0%CPEs: 114EXPL: 0

13 Aug 2024 — A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.9EPSS: 0%CPEs: 64EXPL: 1

05 Aug 2024 — Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity. • https://github.com/Freax13/cve-2024-21980-poc • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •

CVSS: 6.0EPSS: 1%CPEs: 64EXPL: 1

05 Aug 2024 — Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption. • https://github.com/Freax13/cve-2024-21978-poc • CWE-20: Improper Input Validation •

CVSS: 3.2EPSS: 0%CPEs: 130EXPL: 1

11 Jan 2024 — A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information. Un atacante con privilegios puede impedir la entrega de excepciones de depuración a invitados SEV-SNP, lo que podría provocar que los invitados no reciban la información de depuración esperada. A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information. • https://github.com/Freax13/cve-2023-20573-poc •

CVSS: 6.8EPSS: 0%CPEs: 138EXPL: 0

14 Nov 2023 — Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity. El comportamiento inadecuado o inesperado de la instrucción INVD en algunas CPU AMD puede permitir que un atacante con un hipervisor malicioso afecte el comportamiento de reescritura de la línea de caché de la CPU, lo que provocará una posible pérdida de la int... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005 • CWE-221: Information Loss or Omission •

CVSS: 7.8EPSS: 0%CPEs: 130EXPL: 0

14 Nov 2023 — Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity. Una validación de dirección incorrecta en ASP con SNP habilitado puede permitir que un atacante comprometa la integridad de la memoria del invitado. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 •

CVSS: 5.3EPSS: 0%CPEs: 130EXPL: 0

14 Nov 2023 — SMM configuration may not be immutable, as intended, when SNP is enabled resulting in a potential limited loss of guest memory integrity. Es posible que la configuración de SMM no sea inmutable, como se esperaba, cuando SNP está habilitado, lo que genera una posible pérdida limitada de la integridad de la memoria del huésped. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 •

CVSS: 6.1EPSS: 0%CPEs: 180EXPL: 0

14 Nov 2023 — Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service. No validar el valor en APCB puede permitir que un atacante privilegiado altere el token APCB para forzar una lectura de memoria fuera de los límites, lo que podría provocar una denegación de servicio. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 172EXPL: 0

14 Nov 2023 — Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service. Una validación de dirección DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una dirección DRAM no válida, lo que podría provocar una denegación de servicio. Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an ... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 •