72 results (0.022 seconds)

CVSS: 7.5EPSS: 0%CPEs: 114EXPL: 0

13 Aug 2024 — A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution. • https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3003.html • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 6.8EPSS: 0%CPEs: 138EXPL: 0

14 Nov 2023 — Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity. El comportamiento inadecuado o inesperado de la instrucción INVD en algunas CPU AMD puede permitir que un atacante con un hipervisor malicioso afecte el comportamiento de reescritura de la línea de caché de la CPU, lo que provocará una posible pérdida de la int... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3005 • CWE-221: Information Loss or Omission •

CVSS: 6.1EPSS: 0%CPEs: 180EXPL: 0

14 Nov 2023 — Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service. No validar el valor en APCB puede permitir que un atacante privilegiado altere el token APCB para forzar una lectura de memoria fuera de los límites, lo que podría provocar una denegación de servicio. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 • CWE-125: Out-of-bounds Read •

CVSS: 7.8EPSS: 0%CPEs: 172EXPL: 0

14 Nov 2023 — Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service. Una validación de dirección DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una dirección DRAM no válida, lo que podría provocar una denegación de servicio. Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an ... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 •

CVSS: 4.9EPSS: 0%CPEs: 146EXPL: 0

14 Nov 2023 — Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality. Una validación de entrada insuficiente en el ASP Bootloader puede permitir que un atacante privilegiado con acceso físico exponga el contenido de la memoria ASP, lo que podría provocar una pérdida de confidencialidad. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 •

CVSS: 5.7EPSS: 0%CPEs: 186EXPL: 0

14 Nov 2023 — TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service. TOCTOU en el ASP Bootloader puede permitir que un atacante con acceso físico altere los registros ROM SPI después de la verificación del contenido de la memoria, lo que podría provocar una pérdida de confidencialidad o una denegación de servicio. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 • CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition •

CVSS: 7.8EPSS: 0%CPEs: 274EXPL: 0

14 Nov 2023 — Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service. Una validación de dirección DRAM insuficiente en System Management Unit (SMU) puede permitir que un atacante lea/escriba desde/hacia una dirección DRAM no válida, lo que podría provocar una denegación de servicio. Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an ... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3002 •

CVSS: 6.5EPSS: 6%CPEs: 145EXPL: 2

24 Jul 2023 — An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information. A flaw was found in hw, in “Zen 2” CPUs. This issue may allow an attacker to access sensitive information under specific microarchitectural circumstances. Daniel Moghimi discovered that some Intel Processors did not properly clear microarchitectural state after speculative execution of various instructions. A local unprivileged user could use this to obtain to sensiti... • https://github.com/sbaresearch/stop-zenbleed-win • CWE-209: Generation of Error Message Containing Sensitive Information CWE-1239: Improper Zeroization of Hardware Register •

CVSS: 6.8EPSS: 0%CPEs: 176EXPL: 0

11 Jul 2023 — A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information. • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3004 • CWE-203: Observable Discrepancy •

CVSS: 9.4EPSS: 0%CPEs: 126EXPL: 0

09 May 2023 — Insufficient validation of inputs in SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious Uapp or ABL to send malformed or invalid syscall to the bootloader resulting in a potential denial of service and loss of integrity. Insufficient validation of inputs in SVC_MAP_USER_STACK in the ASP (AMD Secure Processor) bootloader may allow an attacker with a malicious Uapp or ABL to send malformed or invalid syscall to the bootloader resulting in a potential denial ... • https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3001 • CWE-20: Improper Input Validation •