Amd

Epyc 7352 Firmware

73 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:29

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

  • EPSS 0.14%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:29

A TOCTOU in ASP bootloader may allow an attacker to tamper with the SPI ROM following data read to memory potentially resulting in S3 data corruption and information disclosure.

  • EPSS 0.04%
  • Published 09.05.2023 19:15:10
  • Last modified 28.01.2025 16:15:27

Insufficient bounds checking in ASP may allow an attacker to issue a system call from a compromised ABL which may cause arbitrary memory values to be initialized to zero, potentially leading to a loss of integrity.

  • EPSS 0.15%
  • Published 01.03.2023 08:15:10
  • Last modified 21.11.2024 06:56:08

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

  • EPSS 0.23%
  • Published 11.01.2023 08:15:14
  • Last modified 07.04.2025 19:15:48

Insufficient bound checks in the SMU may allow an attacker to update the SRAM from/to address space to an invalid value potentially resulting in a denial of service.

  • EPSS 0.09%
  • Published 11.01.2023 08:15:14
  • Last modified 07.04.2025 19:15:48

Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.

  • EPSS 0.23%
  • Published 11.01.2023 08:15:13
  • Last modified 07.04.2025 19:15:48

Insufficient bound checks in the SMU may allow an attacker to update the from/to address space to an invalid value potentially resulting in a denial of service.

  • EPSS 0.08%
  • Published 11.01.2023 08:15:13
  • Last modified 07.04.2025 19:15:47

Insufficient input validation in the SMU may allow a physical attacker to exfiltrate SMU memory contents over the I2C bus potentially leading to a loss of confidentiality.

  • EPSS 0.14%
  • Published 11.01.2023 08:15:13
  • Last modified 07.04.2025 16:15:20

Improper syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory out-of-bounds, potentially leading to a denial-of-service.

  • EPSS 0.14%
  • Published 11.01.2023 08:15:13
  • Last modified 07.04.2025 16:15:20

Insufficient syscall input validation in the ASP Bootloader may allow a privileged attacker to read memory outside the bounds of a mapped register potentially leading to a denial of service.