cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2023-31315,https://securityvulnerability.io/vulnerability/CVE-2023-31315,Potential vulnerability in MSR could lead to arbitrary code execution,"CVE-2023-31315 is a potential vulnerability in AMD's model specific register (MSR) that could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution. The vulnerability affects the majority of AMD processors and has been patched by AMD in the Ryzen 3000 Series desktop processors. It has not been exploited by ransomware groups. Additionally, there are warnings about multiple cloud service provider attacks related to the Black Hat USA conference, and a potential vulnerability in Office that could lead to sensitive data leakage.",Amd,"3rd Gen Amd Epyc™ Processors,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7045 Series Mobile Processors,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processors With Radeon™ Graphics",7.5,HIGH,0.0004299999854993075,false,true,false,false,,false,false,2024-08-12T13:38:00.000Z,0 CVE-2023-20579,https://securityvulnerability.io/vulnerability/CVE-2023-20579,Potential Bypass of Integrity and Availability Protections in AMD SPI Protection Feature,"The vulnerability in AMD's SPI protection feature is associated with improper access controls that may enable a user with Ring0 (kernel mode) privileges to bypass security measures. This bypass could lead to significant risks, including potential loss of data integrity and system availability. Affected users should remain vigilant and apply recommended security updates as outlined in vendor advisories.",AMD,"AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics ,AMD Ryzen™ 7000 Series Desktop Processor ,AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics ,AMD Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics ,AMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics ,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics,AMD Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics ,AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics ,AMD Ryzen™ 7045 Series Mobile Processors ,AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics ,AMD Ryzen™ Embedded V2000,AMD Ryzen™ Embedded V3000,AMD Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics ,AMD Ryzen™ 3000 Series Processors with Radeon™ Graphics",6,MEDIUM,0.0004299999854993075,false,false,false,false,,false,false,2024-02-13T19:32:11.904Z,0 CVE-2023-20571,https://securityvulnerability.io/vulnerability/CVE-2023-20571,,"A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation. ",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”,Ryzen™ 7000 Series Desktop Processors “Raphael” XD3,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”,AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”, Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8",8.1,HIGH,0.0017000000225380063,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20563,https://securityvulnerability.io/vulnerability/CVE-2023-20563,,"Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access. ",Amd,"Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Ryzen™ 7000 Series Desktop Processors “raphael” Xd3,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,Ryzen™ 7040 Series Mobile Processors With Radeon™ Graphics “phoenix” Fp7/fp7r2/fp8,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded V3000",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20596,https://securityvulnerability.io/vulnerability/CVE-2023-20596,,"Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution. ",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics Formerly codenamed “Cezanne” AM4,Ryzen™ 7000 Series Desktop Processors with Radeon™ Graphics Formerly codenamed “Raphael”,Ryzen™ 7000 Series Desktop Processors with Radeon™ Graphics Formerly codenamed “Raphael” X3D,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics Formerly codenamed “Phoenix”",9.8,CRITICAL,0.0024900001008063555,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20565,https://securityvulnerability.io/vulnerability/CVE-2023-20565,,"Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access. ",AMD,"Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”,Ryzen™ 7000 Series Desktop Processors “Raphael” XD3,AMD Ryzen™ 6000 Series Processors with Radeon™ Graphics ""Rembrandt"",AMD Ryzen™ 7035 Series Processors with Radeon™ Graphics “Rembrandt-R”,AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics “Barcelo”,AMD Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”, Ryzen™ 7040 Series Mobile Processors with Radeon™ Graphics “Phoenix” FP7/FP7r2/FP8,AMD Ryzen™ Embedded V3000",7.8,HIGH,0.0004299999854993075,false,false,false,false,,false,false,2023-11-14T19:15:00.000Z,0 CVE-2023-20598,https://securityvulnerability.io/vulnerability/CVE-2023-20598,," An improper privilege management in the AMD Radeon™ Graphics driver may allow an authenticated attacker to craft an IOCTL request to gain I/O control over arbitrary hardware ports or physical addresses resulting in a potential arbitrary code execution. ",Amd,"Radeon™ Rx 5000 Series Graphics Cards,Radeon™ Rx 6000 Series Graphics Cards,Radeon™ Rx 7000 Series Graphics Cards,Radeon™ Pro W5000 Series Graphics Cards,Radeon™ Pro W6000 Series Graphics Cards,Radeon™ Pro W7000 Series Graphics Cards,Ryzen™ 7045 Series Processors With Radeon™ Graphics,Ryzen™ 7020 Series Processors With Radeon™ Graphics,Ryzen™ 7040 Series Processors With Radeon™ Graphics,Ryzen™ 7000 Series Processors With Radeon™ Graphics,Ryzen™ 6000 Series Processors With Radeon™ Graphics,Ryzen™ 7035 Series Processors With Radeon™ Graphics",7.8,HIGH,0.0004199999966658652,false,false,false,true,true,false,false,2023-10-17T14:15:00.000Z,0 CVE-2023-20569,https://securityvulnerability.io/vulnerability/CVE-2023-20569,," A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. ",Amd,"Ryzen™ 3000 Series Desktop Processors,Ryzen™ Pro 3000 Series Desktop Processors,Ryzen™ 3000 Series Desktop Processors With Radeon™ Graphics,Ryzen™ Pro 3000 Series Processors With Radeon™ Vega Graphics,Athlon™ 3000 Series Processors With Radeon™ Graphics,Athlon™ Pro 3000 Series Processors With Radeon™ Vega Graphics,Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Ryzen™ Pro 4000 Series Desktop Processors,Ryzen™ 5000 Series Desktop Processors,Ryzen™ 5000 Series Desktop Processors With Radeon™ Graphics,Ryzen™ Pro 5000 Series Desktop Processors,Ryzen™ Threadripper™ 2000 Series Processors,Ryzen™ Threadripper™ 5000 Series Processors,Ryzen™ Threadripper™ 3000 Series Processors,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Ryzen™ 5000 Series Processors With Radeon™ Graphics,Ryzen™ Pro 5000 Series Processors,Ryzen™ 6000 Series Processors With Radeon™ Graphics,Ryzen™ Pro 6000 Series Processors,Ryzen™ 7040 Series Processors With Radeon™ Graphics,Ryzen™ 7000 Series Processors,Ryzen™ 7000 Series Processors With Radeon™ Graphics,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors",4.7,MEDIUM,0.000699999975040555,false,false,false,false,,false,false,2023-08-08T18:15:00.000Z,0