cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-20578,https://securityvulnerability.io/vulnerability/CVE-2023-20578,Attackers Can Modify Communications Buffer for Arbitrary Code Execution,"A vulnerability exists in the AMD BIOS stemming from a Time-of-Check Time-of-Use (TOCTOU) issue. This flaw can be exploited by attackers who have ring0 privileges and access to critical system components such as the BIOS menu or UEFI shell. By leveraging this vulnerability, an attacker could potentially alter the communications buffer, leading to the execution of arbitrary code. This capability raises significant security concerns as it may allow unauthorized access and control over affected systems.",Amd,"Amd Epyc™ 7001 Processors,Amd Epyc™ 7002 Processors,Amd Epyc™ 7003 Processors,Amd Epyc™ 9004 Processors,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ Threadripper™ Pro 5000wx Processors,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003,Amd Ryzen™ Embedded 7000,Amd Ryzentm Embedded V3000",6.4,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-08-13T16:52:58.457Z,0 CVE-2022-23829,https://securityvulnerability.io/vulnerability/CVE-2022-23829,Potential weakness in AMD SPI protection features may allow malicious attackers to bypass kernel mode protections,"A potential weakness in the SPI protection features of AMD systems enables a malicious actor with Ring0 (kernel mode) access to circumvent the built-in protections of the System Management Mode (SMM) ROM. This may lead to unauthorized access to critical system functions, potentially compromising the integrity of the entire system. Organizations utilizing affected AMD products should assess their security measures and enhance their defenses against potential exploitation.",Amd,"Amd Ryzen™ Threadripper™ Pro Processors 5900 Wx-series,Amd Ryzen™ 6000 Series Mobile Processors And Workstations,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 5000 Series Mobile Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors,Amd Ryzen™ 3000 Series Mobile Processor / 2nd Gen Amd Ryzen™ Mobile Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro Processor,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc (tm) Embedded 7002,Amd Epyc™ Embedded 7003,Amd Ryzentm Embedded R1000,Amd Ryzentm Embedded R2000,Amd Ryzentm Embedded 5000,Amd Ryzentm Embedded V1000,Amd Ryzentm Embedded V2000,Amd Ryzentm Embedded V3000",8.2,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2024-06-18T19:01:24.315Z,0