Amd

Epyc 7443p Firmware

96 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.14%
  • Published 11.01.2023 08:15:13
  • Last modified 07.04.2025 16:15:20

Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.

  • EPSS 0.14%
  • Published 11.01.2023 08:15:13
  • Last modified 07.04.2025 16:15:20

Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.

  • EPSS 0.07%
  • Published 11.01.2023 08:15:13
  • Last modified 07.04.2025 16:15:20

TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.

  • EPSS 0.06%
  • Published 11.01.2023 08:15:11
  • Last modified 09.04.2025 15:15:43

Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.

  • EPSS 0.06%
  • Published 11.01.2023 08:15:11
  • Last modified 08.04.2025 21:15:43

Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.

  • EPSS 0.06%
  • Published 11.01.2023 08:15:11
  • Last modified 08.04.2025 21:15:42

Insufficient bounds checking in ASP (AMD Secure Processor) firmware while handling BIOS mailbox commands, may allow an attacker to write partially-controlled data out-of-bounds to SMM or SEV-ES regions which may lead to a potential loss of integrity ...

  • EPSS 0.06%
  • Published 11.01.2023 08:15:11
  • Last modified 09.04.2025 15:15:43

Insufficient input validation in SYS_KEY_DERIVE system call in a compromised user application or ABL may allow an attacker to corrupt ASP (AMD Secure Processor) OS memory which may lead to potential arbitrary code execution.

  • EPSS 0.02%
  • Published 11.01.2023 08:15:11
  • Last modified 09.04.2025 15:15:43

Insufficient validation of address mapping to IO in ASP (AMD Secure Processor) may result in a loss of memory integrity in the SNP guest.

  • EPSS 0.04%
  • Published 11.01.2023 08:15:10
  • Last modified 09.04.2025 14:15:22

Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.

  • EPSS 0.06%
  • Published 11.01.2023 08:15:10
  • Last modified 09.04.2025 15:15:43

Failure to verify the mode of CPU execution at the time of SNP_INIT may lead to a potential loss of memory integrity for SNP guests.