Amd

Ryzen Threadripper 3970x Firmware

40 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.1%
  • Veröffentlicht 13.08.2024 17:15:18
  • Zuletzt bearbeitet 15.05.2026 05:16:30

Insufficient checking of memory buffer in AMD Secure Processor (ASP) Secure OS may allow an attacker with a malicious trusted application to read/write to the ASP Secure OS kernel virtual address space, potentially resulting in privilege escalation.

  • EPSS 0.05%
  • Veröffentlicht 14.11.2023 19:15:15
  • Zuletzt bearbeitet 21.11.2024 07:41:06

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

  • EPSS 0.43%
  • Veröffentlicht 14.11.2023 19:15:10
  • Zuletzt bearbeitet 21.11.2024 06:49:18

Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.

  • EPSS 0.18%
  • Veröffentlicht 14.11.2023 19:15:10
  • Zuletzt bearbeitet 21.11.2024 06:49:18

Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.

  • EPSS 0.03%
  • Veröffentlicht 14.11.2023 19:15:10
  • Zuletzt bearbeitet 21.11.2024 06:34:41

Insufficient DRAM address validation in System Management Unit (SMU) may allow an attacker to read/write from/to an invalid DRAM address, potentially resulting in denial-of-service.

  • EPSS 0.06%
  • Veröffentlicht 20.09.2023 18:15:12
  • Zuletzt bearbeitet 27.06.2025 22:15:25

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.06%
  • Veröffentlicht 20.09.2023 18:15:12
  • Zuletzt bearbeitet 27.06.2025 22:15:23

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

  • EPSS 0.13%
  • Veröffentlicht 08.08.2023 18:15:11
  • Zuletzt bearbeitet 21.11.2024 07:41:10

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.  ...

Exploit
  • EPSS 5.88%
  • Veröffentlicht 24.07.2023 20:15:10
  • Zuletzt bearbeitet 13.02.2025 17:16:01

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

  • EPSS 0.09%
  • Veröffentlicht 09.05.2023 19:15:10
  • Zuletzt bearbeitet 28.01.2025 16:15:29

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.