// For flags

CVE-2023-31347

 

Severity Score

"-"
*CVSS v-

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

Due to a code bug in
Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a
guest to observe an incorrect TSC when Secure TSC is enabled potentially
resulting in a loss of guest integrity.

Debido a un error de código en Secure_TSC, el firmware SEV puede permitir que un atacante con altos privilegios haga que un invitado observe un TSC incorrecto cuando Secure TSC está habilitado, lo que podría provocar una pérdida de integridad del invitado.

*Credits: N/A
CVSS Scores
Attack Vector
-
Attack Complexity
-
Privileges Required
-
User Interaction
-
Scope
-
Confidentiality
-
Integrity
-
Availability
-
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-04-27 CVE Reserved
  • 2024-02-13 CVE Published
  • 2024-08-16 CVE Updated
  • 2024-10-23 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
AMD
Search vendor "AMD"
3rd Gen AMD EPYC™ Processors
Search vendor "AMD" for product "3rd Gen AMD EPYC™ Processors"
<=
Search vendor "AMD" for product "3rd Gen AMD EPYC™ Processors" and version " <= "
en
Affected
AMD
Search vendor " AMD"
4th Gen AMD EPYC™ Processors
Search vendor " AMD" for product "4th Gen AMD EPYC™ Processors"
<=
Search vendor " AMD" for product "4th Gen AMD EPYC™ Processors" and version " <= "
en
Affected