Amd

Epyc 9384x Firmware

16 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 13.08.2024 17:15:19
  • Zuletzt bearbeitet 18.03.2025 20:15:17

A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.

  • EPSS 0.02%
  • Veröffentlicht 13.08.2024 17:15:19
  • Zuletzt bearbeitet 12.12.2024 20:29:14

IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a ...

  • EPSS 0.23%
  • Veröffentlicht 13.08.2024 17:15:19
  • Zuletzt bearbeitet 13.03.2025 17:15:24

Improper re-initialization of IOMMU during the DRTM event may permit an untrusted platform configuration to persist, allowing an attacker to read or modify hypervisor memory, potentially resulting in loss of confidentiality, integrity, and availabili...

  • EPSS 1.43%
  • Veröffentlicht 05.08.2024 16:15:35
  • Zuletzt bearbeitet 26.11.2024 19:13:33

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.

  • EPSS 1.67%
  • Veröffentlicht 05.08.2024 16:15:35
  • Zuletzt bearbeitet 26.11.2024 19:13:55

Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.

  • EPSS 0.93%
  • Veröffentlicht 05.08.2024 16:15:34
  • Zuletzt bearbeitet 26.11.2024 19:10:21

Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.

  • EPSS 0.04%
  • Veröffentlicht 13.02.2024 20:15:52
  • Zuletzt bearbeitet 20.03.2025 21:15:19

Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.

  • EPSS 0.05%
  • Veröffentlicht 13.02.2024 20:15:52
  • Zuletzt bearbeitet 17.03.2025 18:15:15

Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity.  

  • EPSS 0.09%
  • Veröffentlicht 11.01.2024 14:15:43
  • Zuletzt bearbeitet 21.11.2024 07:41:09

A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information.

  • EPSS 0.05%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:08

Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.