cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-20563,https://securityvulnerability.io/vulnerability/CVE-2023-20563,Insufficient Protections in System Management Mode Affects AMD Products,"The identified vulnerability arises from inadequate security measures in the System Management Mode (SMM) code of AMD processors. This oversight may permit attackers with local access to escalate their privileges, potentially compromising system integrity. To mitigate risks, users are advised to apply the latest patches and follow guidelines provided by AMD to enhance their security posture against such exploitation.",Amd,"Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Ryzen™ 7000 Series Desktop Processors “raphael” Xd3,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,Ryzen™ 7040 Series Mobile Processors With Radeon™ Graphics “phoenix” Fp7/fp7r2/fp8,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded V3000",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20571,https://securityvulnerability.io/vulnerability/CVE-2023-20571,Race Condition Vulnerability in System Management Mode Affecting AMD Products,"A race condition vulnerability exists in the System Management Mode (SMM) code of various AMD processors. An attacker with access to a compromised user space can exploit this vulnerability in conjunction with CVE-2018-8897, potentially leading to privilege escalation. This may allow the attacker to gain higher access levels within the system, making it crucial for users to apply the necessary security updates to mitigate the risks associated with this vulnerability.",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”,Ryzen™ 7000 Series Desktop Processors “Raphael” XD3,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”,AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”, Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8",8.1,HIGH,0.0017000000225380063,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20565,https://securityvulnerability.io/vulnerability/CVE-2023-20565,Insufficient Protections in SMM Code in AMD Products,"The identified vulnerability arises from inadequate protections within the System Management Mode (SMM) code utilized by AMD products. This security flaw could potentially be exploited by attackers with local access, enabling them to elevate their privileges on the affected system. It is crucial for users and administrators to be aware of this issue and to follow best practices for securing their environments against possible exploitation.",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”,Ryzen™ 7000 Series Desktop Processors “Raphael” XD3,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”,AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”, Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8,AMD Ryzen™ Embedded V3000",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2022-23821,https://securityvulnerability.io/vulnerability/CVE-2022-23821,Improper Access Control Vulnerability in AMD System Management Mode,"This vulnerability involves improper access control within System Management Mode (SMM), which may permit an attacker to write to the Serial Peripheral Interface (SPI) ROM. Exploitation of this vulnerability could potentially lead to arbitrary code execution, posing significant security risks to affected systems. It is crucial for users and administrators of AMD platforms to be aware of this issue and implement necessary security measures to safeguard their environments.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse”,Ryzen™ 5000 Series Desktop Processors “vermeer”,Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics “picasso” Am4,Ryzen™ Threadripper™ 2000 Series Processors “colfax”,Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “dali”/”dali” Fp5,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics “picasso” Fp5,Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000",9.8,CRITICAL,0.0028200000524520874,false,false,false,false,,false,false,2023-11-14T18:54:32.952Z,0 CVE-2021-46758,https://securityvulnerability.io/vulnerability/CVE-2021-46758,,"Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity. ",Amd,"Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Ryzen™ 7000 Series Desktop Processors “raphael” Xd3,Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”",6.1,MEDIUM,0.00044999999227002263,false,false,false,false,,false,false,2023-11-14T18:54:25.467Z,0 CVE-2022-23820,https://securityvulnerability.io/vulnerability/CVE-2022-23820,Buffer Validation Flaw in AMD Products,"A buffer validation flaw in AMD's SMM communication buffer poses a security risk by allowing potential attackers to corrupt the SMRAM. This vulnerability enables the possibility of executing arbitrary code, which can lead to unauthorized access and manipulation of the system. To mitigate this risk, users are advised to apply the latest security patches from AMD.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse"",Amd Ryzen™ 5000 Series Desktop Processors “vermeer”,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics “picasso” Am4,Amd Ryzen™ Threadripper™ 2000 Series Processors “colfax”,Amd Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Amd Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics “picasso” Fp5,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7003",7.5,HIGH,0.002240000059828162,false,false,false,false,,false,false,2023-11-14T18:52:21.457Z,0 CVE-2023-20594,https://securityvulnerability.io/vulnerability/CVE-2023-20594,," Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access. ",AMD,"Ryzen™ 3000 Series Desktop Processors “Matisse”,Ryzen™ 5000 Series Desktop Processors “Vermeer” ,Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” ,Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4,Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT,Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3,Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3,Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” ,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics ""Rembrandt"",Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics ""Rembrandt-R"",Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics ""Barcelo"",Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” ,3rd Gen AMD EPYC™ Processors",4.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2023-09-20T18:15:00.000Z,0