- EPSS 0.04%
- Veröffentlicht 13.08.2024 17:15:17
- Zuletzt bearbeitet 12.12.2024 20:41:56
A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.
CVE-2023-20555
- EPSS 0.05%
- Veröffentlicht 08.08.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 07:41:06
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
CVE-2023-20589
- EPSS 0.08%
- Veröffentlicht 08.08.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 07:41:10
An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution. ...
CVE-2022-27672
- EPSS 0.15%
- Veröffentlicht 01.03.2023 08:15:10
- Zuletzt bearbeitet 21.11.2024 06:56:08
When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.
CVE-2021-26316
- EPSS 0.09%
- Veröffentlicht 11.01.2023 08:15:10
- Zuletzt bearbeitet 09.04.2025 16:15:16
Failure to validate the communication buffer and communication service in the BIOS may allow an attacker to tamper with the buffer resulting in potential SMM (System Management Mode) arbitrary code execution.
CVE-2021-26392
- EPSS 0.13%
- Veröffentlicht 09.11.2022 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:56:16
Insufficient verification of missing size check in 'LoadModule' may lead to an out-of-bounds write potentially allowing an attacker with privileges to gain code execution of the OS/kernel by loading a malicious TA.
CVE-2021-26393
- EPSS 0.13%
- Veröffentlicht 09.11.2022 21:15:12
- Zuletzt bearbeitet 21.11.2024 05:56:17
Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacke...
CVE-2020-12931
- EPSS 0.1%
- Veröffentlicht 09.11.2022 21:15:11
- Zuletzt bearbeitet 21.11.2024 05:00:33
Improper parameters handling in the AMD Secure Processor (ASP) kernel may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.
CVE-2020-12930
- EPSS 0.1%
- Veröffentlicht 09.11.2022 21:15:10
- Zuletzt bearbeitet 21.11.2024 05:00:33
Improper parameters handling in AMD Secure Processor (ASP) drivers may allow a privileged attacker to elevate their privileges potentially leading to loss of integrity.