CVE-2023-31346
kernel: Reserved fields in guest message responses may not be zero initialized
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.
No inicializar la memoria en el firmware SEV puede permitir que un atacante privilegiado acceda a datos obsoletos de otros invitados.
A flaw was found in some AMD CPUs where the guest message responses have not been zero-initialized. This issue may allow a local attacker with the ability to run arbitrary code on a container or virtual machine to discover sensitive information contained in the host system's memory.
Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.
An update for linux-firmware is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-04-27 CVE Reserved
- 2024-02-13 CVE Published
- 2024-02-15 First Exploit
- 2025-03-20 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-284: Improper Access Control
CAPEC
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/Freax13/cve-2023-31346-poc | 2024-02-15 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://www.amd.com/en/corporate/product-security/bulletin/AMD-SB-3007 | 2024-02-14 | |
https://access.redhat.com/security/cve/CVE-2023-31346 | 2024-08-27 | |
https://bugzilla.redhat.com/show_bug.cgi?id=2250458 | 2024-08-27 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
AMD Search vendor "AMD" | 3rd Gen AMD EPYC™ Processors Search vendor "AMD" for product "3rd Gen AMD EPYC™ Processors" | <= Search vendor "AMD" for product "3rd Gen AMD EPYC™ Processors" and version " <= " | en |
Affected
| ||||||
AMD Search vendor " AMD" | 4th Gen AMD EPYC™ Processors Search vendor " AMD" for product "4th Gen AMD EPYC™ Processors" | <= Search vendor " AMD" for product "4th Gen AMD EPYC™ Processors" and version " <= " | en |
Affected
|