// For flags

CVE-2023-31346

kernel: Reserved fields in guest message responses may not be zero initialized

Severity Score

6.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Failure to initialize
memory in SEV Firmware may allow a privileged attacker to access stale data
from other guests.

No inicializar la memoria en el firmware SEV puede permitir que un atacante privilegiado acceda a datos obsoletos de otros invitados.

A flaw was found in some AMD CPUs where the guest message responses have not been zero-initialized. This issue may allow a local attacker with the ability to run arbitrary code on a container or virtual machine to discover sensitive information contained in the host system's memory.

Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.

An update for linux-firmware is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
Multiple
Confidentiality
Complete
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-04-27 CVE Reserved
  • 2024-02-13 CVE Published
  • 2024-02-15 First Exploit
  • 2025-03-20 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-284: Improper Access Control
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
AMD
Search vendor "AMD"
3rd Gen AMD EPYC™ Processors
Search vendor "AMD" for product "3rd Gen AMD EPYC™ Processors"
<=
Search vendor "AMD" for product "3rd Gen AMD EPYC™ Processors" and version " <= "
en
Affected
AMD
Search vendor " AMD"
4th Gen AMD EPYC™ Processors
Search vendor " AMD" for product "4th Gen AMD EPYC™ Processors"
<=
Search vendor " AMD" for product "4th Gen AMD EPYC™ Processors" and version " <= "
en
Affected