- EPSS 0.01%
- Published 13.02.2024 20:15:52
- Last modified 14.03.2025 18:15:25
Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.
CVE-2023-4969
- EPSS 0.91%
- Published 16.01.2024 17:15:08
- Last modified 20.06.2025 18:15:22
A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.
CVE-2023-20596
- EPSS 0.53%
- Published 14.11.2023 19:15:16
- Last modified 21.11.2024 07:41:11
Improper input validation in the SMM Supervisor may allow an attacker with a compromised SMI handler to gain Ring0 access potentially leading to arbitrary code execution.
CVE-2023-20563
- EPSS 0.13%
- Published 14.11.2023 19:15:15
- Last modified 21.11.2024 07:41:07
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
CVE-2023-20565
- EPSS 0.13%
- Published 14.11.2023 19:15:15
- Last modified 21.11.2024 07:41:07
Insufficient protections in System Management Mode (SMM) code may allow an attacker to potentially enable escalation of privilege via local access.
CVE-2023-20571
- EPSS 0.39%
- Published 14.11.2023 19:15:15
- Last modified 21.11.2024 07:41:09
A race condition in System Management Mode (SMM) code may allow an attacker using a compromised user space to leverage CVE-2018-8897 potentially resulting in privilege escalation.
CVE-2023-20555
- EPSS 0.05%
- Published 08.08.2023 18:15:11
- Last modified 21.11.2024 07:41:06
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
CVE-2023-20569
- EPSS 0.65%
- Published 08.08.2023 18:15:11
- Last modified 21.11.2024 07:41:08
A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure. ...