Amd

Epyc 7001 Firmware

27 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.05%
  • Veröffentlicht 13.08.2024 17:15:19
  • Zuletzt bearbeitet 18.03.2025 20:15:17

A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.

  • EPSS 0.05%
  • Veröffentlicht 13.08.2024 17:15:17
  • Zuletzt bearbeitet 18.03.2025 16:15:12

An out of bounds memory write when processing the AMD PSP1 Configuration Block (APCB) could allow an attacker with access the ability to modify the BIOS image, and the ability to sign the resulting image, to potentially modify the APCB block resultin...

  • EPSS 0.36%
  • Veröffentlicht 14.11.2023 19:15:16
  • Zuletzt bearbeitet 21.11.2024 07:41:11

Improper or unexpected behavior of the INVD instruction in some AMD CPUs may allow an attacker with a malicious hypervisor to affect cache line write-back behavior of the CPU leading to a potential loss of guest virtual machine (VM) memory integrity....

  • EPSS 0.04%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:05

Insufficient input validation in the ASP Bootloader may enable a privileged attacker with physical access to expose the contents of ASP memory potentially leading to a loss of confidentiality.

  • EPSS 0.04%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:04

TOCTOU in the ASP Bootloader may allow an attacker with physical access to tamper with SPI ROM records after memory content verification, potentially leading to loss of confidentiality or a denial of service.

  • EPSS 0.02%
  • Veröffentlicht 14.11.2023 19:15:10
  • Zuletzt bearbeitet 21.11.2024 06:34:41

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

  • EPSS 0.06%
  • Veröffentlicht 09.05.2023 19:15:10
  • Zuletzt bearbeitet 28.01.2025 16:15:29

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

  • EPSS 0.14%
  • Veröffentlicht 09.05.2023 19:15:10
  • Zuletzt bearbeitet 28.01.2025 16:15:29

A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure.

  • EPSS 0.14%
  • Veröffentlicht 11.01.2023 08:15:13
  • Zuletzt bearbeitet 07.04.2025 16:15:20

Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.

  • EPSS 0.06%
  • Veröffentlicht 11.01.2023 08:15:11
  • Zuletzt bearbeitet 08.04.2025 21:15:43

Insufficient checks in SEV may lead to a malicious hypervisor disclosing the launch secret potentially resulting in compromise of VM confidentiality.