Amd

Ryzen 7 4700g Firmware

16 vulnerabilities found.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.04%
  • Published 13.08.2024 17:15:17
  • Last modified 12.12.2024 20:41:56

A malicious attacker in x86 can misconfigure the Trusted Memory Regions (TMRs), which may allow the attacker to set an arbitrary address range for the TMR, potentially leading to a loss of integrity and availability.

  • EPSS 0.01%
  • Published 13.02.2024 20:15:52
  • Last modified 14.03.2025 18:15:25

Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.

Exploit
  • EPSS 0.91%
  • Published 16.01.2024 17:15:08
  • Last modified 20.06.2025 18:15:22

A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.

  • EPSS 0.08%
  • Published 08.08.2023 18:15:11
  • Last modified 21.11.2024 07:41:10

An attacker with specialized hardware and physical access to an impacted device may be able to perform a voltage fault injection attack resulting in compromise of the ASP secure boot potentially leading to arbitrary code execution.  ...

Exploit
  • EPSS 6.32%
  • Published 24.07.2023 20:15:10
  • Last modified 13.02.2025 17:16:01

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

  • EPSS 0.26%
  • Published 02.04.2023 21:15:08
  • Last modified 20.02.2025 20:15:44

Insufficient control flow management in AmdCpmOemSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to an escalation of privileges.

  • EPSS 0.26%
  • Published 02.04.2023 21:15:08
  • Last modified 25.02.2025 17:15:11

Insufficient control flow management in AmdCpmGpioInitSmm may allow a privileged attacker to tamper with the SMM handler potentially leading to escalation of privileges.

  • EPSS 0.15%
  • Published 01.03.2023 08:15:10
  • Last modified 21.11.2024 06:56:08

When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.

  • EPSS 0.03%
  • Published 09.11.2022 21:15:13
  • Last modified 21.11.2024 06:49:19

IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.

  • EPSS 0.13%
  • Published 10.08.2022 20:15:24
  • Last modified 21.11.2024 06:34:42

Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues ...