Amd

Epyc 7232p Firmware

72 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.11%
  • Veröffentlicht 04.02.2022 23:15:10
  • Zuletzt bearbeitet 21.11.2024 05:00:36

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could po...

  • EPSS 0.06%
  • Veröffentlicht 10.12.2021 22:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:08

A malicious hypervisor in conjunction with an unprivileged attacker process inside an SEV/SEV-ES guest VM may fail to flush the Translation Lookaside Buffer (TLB) resulting in unexpected behavior inside the virtual machine (VM).

  • EPSS 0.13%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:08

Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.

  • EPSS 0.05%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:07

AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.

  • EPSS 0.05%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:07

AMD System Management Unit (SMU) contains a potential issue where a malicious user may be able to manipulate mailbox entries leading to arbitrary code execution.

  • EPSS 0.13%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:07

Improper input and range checking in the AMD Secure Processor (ASP) boot loader image header may allow an attacker to use attacker-controlled values prior to signature validation potentially resulting in arbitrary code execution.

  • EPSS 0.13%
  • Veröffentlicht 16.11.2021 19:15:08
  • Zuletzt bearbeitet 21.11.2024 05:56:08

Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.

  • EPSS 0.05%
  • Veröffentlicht 16.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 05:56:06

Insufficient input validation in the SNP_GUEST_REQUEST command may lead to a potential data abort error and a denial of service.

  • EPSS 0.06%
  • Veröffentlicht 16.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 05:56:05

Failure to validate SEV Commands while SNP is active may result in a potential impact to memory integrity.

  • EPSS 0.15%
  • Veröffentlicht 16.11.2021 19:15:07
  • Zuletzt bearbeitet 21.11.2024 05:56:05

Insufficient ID command validation in the SEV Firmware may allow a local authenticated attacker to perform a denial of service of the PSP.