Amd

Milanpi Firmware

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.07%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:04

A Use-After-Free vulnerability in the management of an SNP guest context page may allow a malicious hypervisor to masquerade as the guest's migration agent resulting in a potential loss of guest integrity.

  • EPSS 0.07%
  • Veröffentlicht 11.01.2023 08:15:13
  • Zuletzt bearbeitet 09.04.2025 15:15:44

Insufficient input validation in the ASP may allow an attacker with physical access, unauthorized write access to memory potentially leading to a loss of integrity or denial of service.

  • EPSS 0.04%
  • Veröffentlicht 11.01.2023 08:15:13
  • Zuletzt bearbeitet 09.04.2025 15:15:44

Insufficient input validation in SEV firmware may allow an attacker to perform out-of-bounds memory reads within the ASP boot loader, potentially leading to a denial of service.

  • EPSS 0.04%
  • Veröffentlicht 11.01.2023 08:15:13
  • Zuletzt bearbeitet 09.04.2025 15:15:44

Insufficient input validation in SVC_ECC_PRIMITIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential loss of integrity and availability.

  • EPSS 0.05%
  • Veröffentlicht 11.01.2023 08:15:13
  • Zuletzt bearbeitet 09.04.2025 15:15:45

Insufficient input validation during parsing of the System Management Mode (SMM) binary may allow a maliciously crafted SMM executable binary to corrupt Dynamic Root of Trust for Measurement (DRTM) user application memory that may result in a potenti...

  • EPSS 0.17%
  • Veröffentlicht 11.01.2023 08:15:13
  • Zuletzt bearbeitet 07.04.2025 16:15:20

Insufficient input validation in ASP may allow an attacker with a malicious BIOS to potentially cause a denial of service.

  • EPSS 0.08%
  • Veröffentlicht 11.01.2023 08:15:11
  • Zuletzt bearbeitet 09.04.2025 15:15:44

Insufficient bounds checking in SEV-ES may allow an attacker to corrupt Reverse Map table (RMP) memory, potentially resulting in a loss of SNP (Secure Nested Paging) memory integrity.