Amd

Epyc 7002 Firmware

33 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.15%
  • Veröffentlicht 11.05.2022 17:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:10

Failure to validate the integer operand in ASP (AMD Secure Processor) bootloader may allow an attacker to introduce an integer overflow in the L2 directory table in SPI flash resulting in a potential denial of service.

  • EPSS 0.06%
  • Veröffentlicht 10.05.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:19

Insufficient validation of elliptic curve points in SEV-legacy firmware may compromise SEV-legacy guest migration potentially resulting in loss of guest's integrity or confidentiality.

  • EPSS 0.13%
  • Veröffentlicht 10.05.2022 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:13

Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity...

  • EPSS 0.11%
  • Veröffentlicht 04.02.2022 23:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:36

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could po...

  • EPSS 0.13%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:08

Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.

  • EPSS 0.13%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:08

Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.

  • EPSS 0.13%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:07

Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.

  • EPSS 0.05%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:07

AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.

  • EPSS 0.05%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:07

AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.

  • EPSS 0.06%
  • Veröffentlicht 16.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 05:00:35

A potential vulnerability exists in AMD Platform Security Processor (PSP) that may allow an attacker to zero any privileged register on the System Management Network which may lead to bypassing SPI ROM protections.