7.5
CVE-2023-31345
- EPSS 0.02%
- Veröffentlicht 12.02.2025 00:15:08
- Zuletzt bearbeitet 23.09.2025 22:15:32
- Quelle psirt@amd.com
- Teams Watchlist Login
- Unerledigt Login
Improper input validation in the SMM handler may allow a privileged attacker to overwrite SMRAM, potentially leading to arbitrary code execution.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Diese Information steht angemeldeten Benutzern zur Verfügung. Login
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerAMD
≫
Produkt
AMD EPYC™ 7003 Processors
Default Statusaffected
Version
MilanPI 1.0.0.C
Status
affected
HerstellerAMD
≫
Produkt
AMD EPYC™ 9004 Processors
Default Statusaffected
Version
GenoaPI 1.0.0.B
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Instinct™ MI300A
Default Statusaffected
Version
MI300API 1.0.0.5
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 3000 Series Desktop Processors
Default Statusaffected
Version
ComboAM4v2PI 1.2.0.C
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 5000 Series Desktop Processors
Default Statusaffected
Version
ComboAM4v2PI 1.2.0.C
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics
Default Statusaffected
Version
ComboAM4v2PI 1.2.0.C
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 7000 Series Desktop Processors
Default Statusaffected
Version
ComboAM5 1.1.0.2
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 4000 Series Desktop Processor with Radeon™ Graphics
Default Statusaffected
Version
ComboAM4v2PI 1.2.0.C
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 8000 Series Processor with Radeon™ Graphics
Default Statusaffected
Version
ComboAM5 1.1.0.2
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ Threadripper™ PRO 5000WX- Series Desktop Processors
Default Statusaffected
Version
ChagallWSPI-sWRX8 1.0.0.7
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics
Default Statusaffected
Version
"Pollock-FT5 1.0.0.7"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 3000 Series Mobile Processor with Radeon™ Graphics
Default Statusaffected
Version
"Picasso-FP5 1.0.1.1"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 4000 Series Mobile Processors with Radeon™ Graphics
Default Statusaffected
Version
"RenoirPI-FP6 1.0.0.D"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 5000 Series Processors with Radeon™ Graphics
Default Statusaffected
Version
"Cezanne-FP6 1.0.1.0"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 7020 Series Processors with Radeon™ Graphics
Default Statusaffected
Version
"MendocinoPI-FT6 1.0.0.6"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 6000 Series Processor with Radeon™ Graphics
Default Statusaffected
Version
"Rembrandt-FP7 1.0.0.A"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 7035 Series Processor with Radeon™ Graphics
Default Statusaffected
Version
"Rembrandt-FP7 1.0.0.A"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 7040 Series Processors with Radeon™ Graphics
Default Statusaffected
Version
"PhoenixPI-FP8-FP7 1.1.0.2"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ 7000 Series Mobile Processors
Default Statusaffected
Version
"DragonRangeFL1PI 1.0.0.3C"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD EPYC™ Embedded 7003
Default Statusaffected
Version
"EmbMilanPI-SP3 1.0.0.8"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD EPYC™ Embedded 9004
Default Statusaffected
Version
EmbGenoaPI-SP5 1.0.0.6
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ Embedded 5000
Default Statusaffected
Version
"EmbAM4PI 1.0.0.5"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ Embedded 7000
Default Statusaffected
Version
EmbeddedAM5PI 1.0.0.1
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ Embedded V2000
Default Statusaffected
Version
"EmbeddedPI-FP6 1.0.0.9"
Status
unaffected
HerstellerAMD
≫
Produkt
AMD Ryzen™ Embedded V3000
Default Statusaffected
Version
"Embedded-PI FP7r2 1.0.0.9"
Status
unaffected
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.02% | 0.031 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
psirt@amd.com | 7.5 | 0.8 | 6 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
|
CWE-1274 Improper Access Control for Volatile Memory Containing Boot Code
The product conducts a secure-boot process that transfers bootloader code from Non-Volatile Memory (NVM) into Volatile Memory (VM), but it does not have sufficient access control or other protections for the Volatile Memory.