Amd

Epyc 9754s Firmware

14 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Published 13.08.2024 17:15:19
  • Last modified 18.03.2025 20:15:17

A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.

  • EPSS 0.02%
  • Published 13.08.2024 17:15:19
  • Last modified 12.12.2024 20:29:14

IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a ...

  • EPSS 0.23%
  • Published 13.08.2024 17:15:19
  • Last modified 13.03.2025 17:15:24

Improper re-initialization of IOMMU during the DRTM event may permit an untrusted platform configuration to persist, allowing an attacker to read or modify hypervisor memory, potentially resulting in loss of confidentiality, integrity, and availabili...

  • EPSS 1.43%
  • Published 05.08.2024 16:15:35
  • Last modified 26.11.2024 19:13:33

Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.

  • EPSS 1.67%
  • Published 05.08.2024 16:15:35
  • Last modified 26.11.2024 19:13:55

Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.

  • EPSS 0.93%
  • Published 05.08.2024 16:15:34
  • Last modified 26.11.2024 19:10:21

Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.

  • EPSS 0.09%
  • Published 11.01.2024 14:15:43
  • Last modified 21.11.2024 07:41:09

A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information.

  • EPSS 0.05%
  • Published 14.11.2023 19:15:15
  • Last modified 21.11.2024 07:41:08

Improper address validation in ASP with SNP enabled may potentially allow an attacker to compromise guest memory integrity.

  • EPSS 0.03%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 05:56:09

Failure to validate the value in APCB may allow a privileged attacker to tamper with the APCB token to force an out-of-bounds memory read potentially resulting in a denial of service.

  • EPSS 0.02%
  • Published 14.11.2023 19:15:10
  • Last modified 21.11.2024 06:34:40

Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.