cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2023-31315,https://securityvulnerability.io/vulnerability/CVE-2023-31315,Potential vulnerability in MSR could lead to arbitrary code execution,"CVE-2023-31315 is a potential vulnerability in AMD's model specific register (MSR) that could allow a malicious program with ring0 access to modify SMM configuration while SMI lock is enabled, potentially leading to arbitrary code execution. The vulnerability affects the majority of AMD processors and has been patched by AMD in the Ryzen 3000 Series desktop processors. It has not been exploited by ransomware groups. Additionally, there are warnings about multiple cloud service provider attacks related to the Black Hat USA conference, and a potential vulnerability in Office that could lead to sensitive data leakage.",Amd,"3rd Gen Amd Epyc™ Processors,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded 5000,Amd Ryzen™ Embedded 7000,Amd Ryzen™ Embedded V1000,Amd Ryzen™ Embedded V2000,Amd Ryzen™ Embedded V3000,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ 3000 Series Processors,Amd Ryzen™ Threadripper™ Pro Processors,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7040 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 7045 Series Mobile Processors,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7020 Series Processors With Radeon™ Graphics,Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics,Amd Ryzen™ 8000 Series Processors With Radeon™ Graphics",7.5,HIGH,0.0004299999854993075,false,,true,false,false,,,false,false,,2024-08-12T13:38:00.000Z,0 CVE-2024-21980,https://securityvulnerability.io/vulnerability/CVE-2024-21980,Possible Overwrite of Guest Memory or UMC Seed in SNP Firmware,"The vulnerability in AMD's SNP firmware arises from improper restrictions on write operations that could be exploited by a malicious hypervisor. This flaw allows unauthorized write actions, which could lead to overwriting a guest's memory or the UMC seed. Such an attack poses serious risks, including a potential breach of confidentiality and integrity, exposing sensitive information and disrupting system operations. Users of AMD's SNP Firmware are advised to assess their environments for this vulnerability and take appropriate measures to mitigate associated risks.",Amd,"3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003",7.9,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-05T16:06:36.216Z,0 CVE-2024-21978,https://securityvulnerability.io/vulnerability/CVE-2024-21978,Hypervisor Memory Leakage Vulnerability Discovered,"The vulnerability in AMD's SEV-SNP relates to improper input validation, which may be exploited by a malicious hypervisor. This flaw enables unauthorized access to read or overwrite guest memory, potentially resulting in significant data leakage or corruption. System administrators and users of affected products should prioritize reviewing the associated vendor advisory for specific mitigation steps and affected versions.",Amd,"3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003",7.9,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-05T16:05:34.019Z,0 CVE-2023-31355,https://securityvulnerability.io/vulnerability/CVE-2023-31355,Hackers Could Overwrite Memory of Decommissioned Guests Through Improper Write Restrictions,"A security flaw has been identified in AMD's Secure Nested Paging (SNP) firmware, stemming from an improper restriction of write operations. This vulnerability may allow a malicious hypervisor to overwrite a guest's unique memory configuration seed (UMC seed). The potential consequence includes the ability to access sensitive data from memory previously allocated to a decommissioned guest system. Consequently, this issue raises significant concerns regarding the isolation and security of virtualized environments, necessitating immediate attention and remediation.",Amd,"3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003",6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-08-05T16:04:24.813Z,0 CVE-2022-23829,https://securityvulnerability.io/vulnerability/CVE-2022-23829,Potential weakness in AMD SPI protection features may allow malicious attackers to bypass kernel mode protections,"A potential weakness in the SPI protection features of AMD systems enables a malicious actor with Ring0 (kernel mode) access to circumvent the built-in protections of the System Management Mode (SMM) ROM. This may lead to unauthorized access to critical system functions, potentially compromising the integrity of the entire system. Organizations utilizing affected AMD products should assess their security measures and enhance their defenses against potential exploitation.",Amd,"Amd Ryzen™ Threadripper™ Pro Processors 5900 Wx-series,Amd Ryzen™ 6000 Series Mobile Processors And Workstations,Amd Ryzen™ 7000 Series Desktop Processors,Amd Ryzen™ 5000 Series Mobile Processors,Amd Ryzen™ 5000 Series Desktop Processors,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ 3000 Series Desktop Processors,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Amd Ryzen™ 4000 Series Mobile Processors,Amd Ryzen™ 3000 Series Mobile Processor / 2nd Gen Amd Ryzen™ Mobile Processor With Radeon™ Graphics,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Amd Ryzen™ Threadripper™ Pro Processor,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc (tm) Embedded 7002,Amd Epyc™ Embedded 7003,Amd Ryzentm Embedded R1000,Amd Ryzentm Embedded R2000,Amd Ryzentm Embedded 5000,Amd Ryzentm Embedded V1000,Amd Ryzentm Embedded V2000,Amd Ryzentm Embedded V3000",8.2,HIGH,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-06-18T19:01:24.315Z,0 CVE-2023-20587,https://securityvulnerability.io/vulnerability/CVE-2023-20587,"{""Arbitrary Code Execution Vulnerability in SMM's SPI Flash""}","An improper access control vulnerability in AMD's System Management Mode (SMM) may allow attackers unauthorized access to system components, specifically targeting the Serial Peripheral Interface (SPI) flash. This exploitation can potentially lead to arbitrary code execution, granting attackers elevated privileges and the ability to execute malicious code within the system. It is crucial for users and organizations utilizing AMD products to review their systems and apply necessary mitigations as outlined in AMD's security advisory.",AMD,"3rd Gen AMD EPYC™ Processors,4th Gen AMD EPYC™ Processors,1st Gen AMD EPYC™ Processors,2nd Gen AMD EPYC™ Processors,AMD EPYC(TM) Embedded 3000 ,AMD EPYC(TM) Embedded 7002 ,AMD EPYC(TM) Embedded 7003,AMD EPYC(TM) Embedded 9003",,,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-13T19:31:22.706Z,0 CVE-2023-31347,https://securityvulnerability.io/vulnerability/CVE-2023-31347,Guest Integrity at Risk Due to Code Bug in Secure TSC,"A code bug present in the SEV firmware related to the Secure TSC function has been identified, allowing an attacker with elevated privileges to influence the Time Stamp Counter (TSC) perceived by guests when Secure TSC is enabled. This manipulation could lead to a compromised state of guest integrity, potentially impacting the stability and reliability of the virtualized environment.",Amd,"3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors",4.9,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2024-02-13T19:18:51.045Z,0 CVE-2023-31346,https://securityvulnerability.io/vulnerability/CVE-2023-31346,Privileged Attacker May Access Stale Data from Other Guests via Failure to Initialize Memory,"A vulnerability in AMD's SEV Firmware stems from a failure to properly initialize memory, creating a risk where a privileged attacker can access outdated data belonging to other virtual guests. This issue presents significant security implications for environments utilizing virtualization, as it may compromise the confidentiality of sensitive information processed by other users. Users of affected AMD SEV Firmware must prioritize remediation efforts to safeguard their virtualized workloads.",AMD,"3rd Gen AMD EPYC™ Processors,4th Gen AMD EPYC™ Processors ",6,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-02-13T19:18:19.089Z,0 CVE-2023-20573,https://securityvulnerability.io/vulnerability/CVE-2023-20573,Debug Exception Delivery in Secure Nested Paging,"A vulnerability exists wherein a privileged attacker can interfere with the delivery of debug exceptions to Secure Encrypted Virtualization (SEV) with Secure Nested Paging (SNP) guests. This action may prevent these guests from receiving the necessary debug information, potentially affecting overall system performance and security monitoring. The flaw raises significant concerns regarding the integrity and reliability of debugging processes within affected environments.",AMD,"3rd Gen AMD EPYC™ Processors,4th Gen AMD EPYC™ Processors",3.2,LOW,0.0004299999854993075,false,,false,false,true,2023-03-11T15:04:51.000Z,true,false,false,,2024-01-11T13:53:52.581Z,0 CVE-2023-20592,https://securityvulnerability.io/vulnerability/CVE-2023-20592,Cache Line Write-back Vulnerability in AMD CPUs Affected by Malicious Hypervisors,"A vulnerability exists within certain AMD CPUs due to improper behavior of the INVD instruction when controlled by a malicious hypervisor. This flaw allows attackers to manipulate the cache line write-back mechanisms of the CPU, potentially compromising the memory integrity of guest virtual machines. As a result, sensitive data within virtual environments may be exposed to unauthorized access, posing a serious risk to cloud services and virtualization platforms.",Amd,"1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors",6.5,MEDIUM,0.0005300000193528831,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-20521,https://securityvulnerability.io/vulnerability/CVE-2023-20521,TOCTOU Vulnerability in ASP Bootloader of AMD Products,"A time-of-check to time-of-use (TOCTOU) vulnerability exists within the ASP Bootloader utilized in certain AMD products. This security flaw allows an attacker with physical access to exploit the race condition during memory content verification. By tampering with SPI ROM records after the integrity check, the attacker could compromise confidentiality or potentially initiate a denial of service, undermining the reliability of the affected devices.",Amd,"Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics “picasso” Am4,Ryzen™ Threadripper™ 2000 Series Processors “colfax”,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “dali”/”dali” Fp5,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics “picasso” Fp5,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Ryzen™ Embedded R1000,Amd Ryzen™ Embedded R2000,Amd Ryzen™ Embedded V1000",3.3,LOW,0.0005600000149570405,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-20526,https://securityvulnerability.io/vulnerability/CVE-2023-20526,Insufficient Input Validation in ASP Bootloader from AMD,"The ASP Bootloader by AMD is susceptible to a vulnerability that stems from insufficient input validation, allowing a privileged attacker with physical access to potentially access and expose sensitive ASP memory contents. This could result in a significant loss of confidentiality, making it crucial for users to prioritize security measures to mitigate the risk associated with this flaw.",Amd,"Amd Ryzen™ Threadripper™ 2000 Series Processors “colfax”,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003",4.6,MEDIUM,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-20566,https://securityvulnerability.io/vulnerability/CVE-2023-20566,Improper Address Validation in AMD Products with SNP Enabled,"A vulnerability exists in AMD's ASP when Secure Nested Paging (SNP) is enabled, which may allow an attacker to compromise guest memory integrity by exploiting improper address validation. This flaw could potentially lead to unauthorized access and manipulation of sensitive data within guest systems.",Amd,"3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7003,Amd Epyc™ Embedded 9003",5.3,MEDIUM,0.0006399999838322401,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-20519,https://securityvulnerability.io/vulnerability/CVE-2023-20519,Use-After-Free Vulnerability in AMD Guest Context Management,"A Use-After-Free vulnerability exists in the management of Secure Nested Paging (SNP) guest context within AMD products. This flaw may enable a malicious hypervisor to impersonate a guest's migration agent, potentially resulting in unauthorized access and jeopardizing the integrity of the guest's system. It highlights the need for improved security measures in virtualization environments to protect against exploitation.",Amd,"3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors",3.3,LOW,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2023-20533,https://securityvulnerability.io/vulnerability/CVE-2023-20533,Insufficient DRAM Address Validation in AMD System Management Unit,"The vulnerability involves insufficient validation of DRAM addresses within the System Management Unit (SMU) of AMD products. This flaw may enable an attacker to manipulate the system's memory by reading from or writing to unauthorized DRAM addresses, potentially leading to system instability or a denial-of-service condition. For detailed information on the implications and recommended mitigations, please refer to the official AMD security bulletins.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse"",Amd Ryzen™ 5000 Series Desktop Processors “vermeer”,Amd Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Amd Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Ryzen™ Embedded 5000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003",7.5,HIGH,0.0010400000028312206,false,,false,false,false,,,false,false,,2023-11-14T19:15:00.000Z,0 CVE-2022-23830,https://securityvulnerability.io/vulnerability/CVE-2022-23830,Memory Integrity Vulnerability in AMD Products Due to SMM Configuration Flaw,"A configuration issue in the System Management Mode (SMM) can lead to a situation where desired immutability is not maintained when Secure Nested Paging (SNP) is active. This flaw may expose the system to potential risks associated with the integrity of guest memory, impacting overall security.",Amd,"3rd Gen Amd Epyc™ Processors,4th Gen Amd Epy™ Processors,Amd Epyc™ Embedded 7003",1.9,LOW,0.0006799999973736703,false,,false,false,false,,,false,false,,2023-11-14T18:53:28.408Z,0 CVE-2021-26345,https://securityvulnerability.io/vulnerability/CVE-2021-26345,Out-of-Bounds Memory Read Vulnerability in AMD Processors,"A vulnerability exists in AMD processors due to improper validation of the APCB token value. This flaw allows a privileged attacker to manipulate the APCB token, potentially leading to an out-of-bounds memory read. Exploitation of this vulnerability may result in a denial of service, interrupting the functionality of affected systems. Users are advised to apply patches and updates to mitigate the risk associated with this vulnerability.",Amd,"2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003",1.9,LOW,0.0007300000288523734,false,,false,false,false,,,false,false,,2023-11-14T18:53:20.979Z,0 CVE-2022-23820,https://securityvulnerability.io/vulnerability/CVE-2022-23820,Buffer Validation Flaw in AMD Products,"A buffer validation flaw in AMD's SMM communication buffer poses a security risk by allowing potential attackers to corrupt the SMRAM. This vulnerability enables the possibility of executing arbitrary code, which can lead to unauthorized access and manipulation of the system. To mitigate this risk, users are advised to apply the latest security patches from AMD.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse"",Amd Ryzen™ 5000 Series Desktop Processors “vermeer”,Amd Ryzen™ 5000 Series Desktop Processor With Radeon™ Graphics “cezanne”,Amd Athlon™ 3000 Series Desktop Processors With Radeon™ Graphics “picasso” Am4,Amd Ryzen™ Threadripper™ 2000 Series Processors “colfax”,Amd Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Amd Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws,Amd Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics “pollock”,Amd Ryzen™ 3000 Series Mobile Processor With Radeon™ Graphics “picasso” Fp5,Amd Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir” Fp6,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Amd Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “cezanne”,Amd Ryzen™ 6000 Series Processors With Radeon™ Graphics ""rembrandt"",Amd Ryzen™ 7035 Series Processors With Radeon™ Graphics “rembrandt-r”,Amd Ryzen™ 5000 Series Processors With Radeon™ Graphics “barcelo”,Amd Ryzen™ 7030 Series Mobile Processors With Radeon™ Graphics “barcelo-r”,3rd Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 7003",7.5,HIGH,0.002240000059828162,false,,false,false,false,,,false,false,,2023-11-14T18:52:21.457Z,0 CVE-2021-46774,https://securityvulnerability.io/vulnerability/CVE-2021-46774,Insufficient DRAM Address Validation in AMD System Management Unit,"The vulnerability in the System Management Unit (SMU) manifests as an insufficient validation of DRAM addresses. This flaw allows an attacker to read or write to invalid memory addresses, which could lead to instability and potential denial-of-service conditions. The issue is critical for systems relying on this management component, as it can compromise the security and reliability of the affected products.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse"",Amd Ryzen™ 5000 Series Desktop Processors “vermeer”,Amd Ryzen™ Threadripper™ 3000 Series Processors “castle Peak” Hedt,Amd Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Amd Ryzen™ Threadripper™ Pro 3000wx Series Processors “chagall” Ws,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors,Amd Epyc™ Embedded 3000,Amd Epyc™ Embedded 7002,Amd Epyc™ Embedded 7003,Amd Ryzen™ Embedded 5000",6.7,MEDIUM,0.0010400000028312206,false,,false,false,false,,,false,false,,2023-11-14T18:52:11.012Z,0 CVE-2023-20594,https://securityvulnerability.io/vulnerability/CVE-2023-20594,Improper Variable Initialization in AMD DXE Driver,"The vulnerability arises from improper variable initialization in the DXE driver, which may enable a privileged user to exploit this flaw and potentially leak sensitive information through local access. Organizations using affected versions of the AMD DXE driver should apply the latest security patch to mitigate the risk of information exposure.",AMD,"Ryzen™ 3000 Series Desktop Processors “Matisse”,Ryzen™ 5000 Series Desktop Processors “Vermeer” ,Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne” ,Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4,Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDT,Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3,Ryzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3,Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics “Renoir” FP6,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Lucienne” ,Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics “Cezanne”,Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics ""Rembrandt"",Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics ""Rembrandt-R"",Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics ""Barcelo"",Ryzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R” ,3rd Gen AMD EPYC™ Processors",4.4,MEDIUM,0.0004299999854993075,false,,false,false,false,,,false,false,,2023-09-20T18:15:00.000Z,0 CVE-2023-20569,https://securityvulnerability.io/vulnerability/CVE-2023-20569,Side Channel Vulnerability Affecting AMD Processors,"A side channel vulnerability has been identified in certain AMD CPUs, enabling attackers to manipulate the return address prediction. This flaw can result in speculative execution at addresses controlled by the attacker, which may lead to unauthorized information disclosure. It highlights the critical need for robust defensive measures to mitigate potential risks associated with speculative execution on affected processors.",Amd,"Ryzen™ 3000 Series Desktop Processors,Ryzen™ Pro 3000 Series Desktop Processors,Ryzen™ 3000 Series Desktop Processors With Radeon™ Graphics,Ryzen™ Pro 3000 Series Processors With Radeon™ Vega Graphics,Athlon™ 3000 Series Processors With Radeon™ Graphics,Athlon™ Pro 3000 Series Processors With Radeon™ Vega Graphics,Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics,Ryzen™ Pro 4000 Series Desktop Processors,Ryzen™ 5000 Series Desktop Processors,Ryzen™ 5000 Series Desktop Processors With Radeon™ Graphics,Ryzen™ Pro 5000 Series Desktop Processors,Ryzen™ Threadripper™ 2000 Series Processors,Ryzen™ Threadripper™ 5000 Series Processors,Ryzen™ Threadripper™ 3000 Series Processors,Athlon™ 3000 Series Mobile Processors With Radeon™ Graphics,Ryzen™ 5000 Series Processors With Radeon™ Graphics,Ryzen™ Pro 5000 Series Processors,Ryzen™ 6000 Series Processors With Radeon™ Graphics,Ryzen™ Pro 6000 Series Processors,Ryzen™ 7040 Series Processors With Radeon™ Graphics,Ryzen™ 7000 Series Processors,Ryzen™ 7000 Series Processors With Radeon™ Graphics,1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors",4.7,MEDIUM,0.000699999975040555,false,,false,false,false,,,false,false,,2023-08-08T18:15:00.000Z,0 CVE-2023-20593,https://securityvulnerability.io/vulnerability/CVE-2023-20593,Microarchitectural Vulnerability in AMD Zen 2 CPUs,"An issue has been identified within AMD's Zen 2 microarchitecture that could enable an attacker to exploit specific conditions, potentially leading to unauthorized access to sensitive data. This vulnerability underscores the importance of verifying the security of CPU architectures, particularly in environments handling sensitive information. Mitigation measures should be prioritized to ensure system integrity and data protection.",Amd,"Ryzen™ 3000 Series Desktop Processors “matisse” Am4,Amd Ryzen™ 4000 Series Desktop Processors With Radeon™ Graphics “renoir” Am4,3rd Gen Amd Ryzen™ Threadripper™ Processors “castle Peak” Hedt,Ryzen™ Threadripper™ Pro Processors “castle Peak” Ws Sp3,Ryzen™ 5000 Series Mobile Processors With Radeon™ Graphics “lucienne”,Ryzen™ 4000 Series Mobile Processors With Radeon™ Graphics “renoir”,Ryzen™ 7020 Series Processors “mendocino” Ft6,2nd Gen Amd Epyc™ Processors",5.5,MEDIUM,0.0009200000204145908,false,,true,false,true,2023-07-26T20:03:11.000Z,true,false,false,,2023-07-24T20:15:00.000Z,0 CVE-2023-20575,https://securityvulnerability.io/vulnerability/CVE-2023-20575,Power Side-Channel Vulnerability in AMD Processors,"A power side-channel vulnerability exists in certain AMD processors that allows an authenticated attacker to leverage power reporting features. By monitoring the power consumption of a program's execution within an AMD Secure Encrypted Virtualization (SEV) virtual machine, the attacker could potentially extract sensitive information. This vulnerability highlights the risks associated with power monitoring capabilities in virtualized environments.",Amd,"1st Gen Amd Epyc™ Processors,2nd Gen Amd Epyc™ Processors,3rd Gen Amd Epyc™ Processors,4th Gen Amd Epyc™ Processors",6.5,MEDIUM,0.0006000000284984708,false,,false,false,false,,,false,false,,2023-07-11T19:15:00.000Z,0 CVE-2023-20524,https://securityvulnerability.io/vulnerability/CVE-2023-20524,Out of Bounds Write Vulnerability in AMD Products,"A vulnerability has been identified in AMD's ASP products that allows an attacker with a compromised system to send malformed commands to an ASP running on a different CPU. This can result in an out of bounds write condition, posing a significant risk to data integrity and system reliability. Vigilance is necessary to mitigate potential exploits stemming from this security flaw.",Amd,"2nd Gen Amd Epyc™,3rd Gen Amd Epyc™",7.5,HIGH,0.0005699999746866524,false,,false,false,false,,,false,false,,2023-05-09T19:15:00.000Z,0 CVE-2023-20520,https://securityvulnerability.io/vulnerability/CVE-2023-20520,Improper Access Control in ASP Bootloader Affects AMD Products,"A flaw in the ASP Bootloader's access control settings may allow an attacker to manipulate the return address. This could result in a stack-based buffer overrun, possibly enabling the execution of arbitrary code. Adequate security measures are essential to mitigate the risk associated with this vulnerability.",Amd,"1st Gen Amd Epyc™,2nd Gen Amd Epyc™,3rd Gen Amd Epyc™",9.8,CRITICAL,0.003100000089034438,false,,false,false,false,,,false,false,,2023-05-09T19:15:00.000Z,0