- EPSS 0.06%
- Veröffentlicht 13.08.2024 17:15:18
- Zuletzt bearbeitet 16.08.2024 21:35:00
Insufficient checking of memory buffer in ASP Secure OS may allow an attacker with a malicious TA to read/write to the ASP Secure OS kernel virtual address space, potentially leading to privilege escalation.
- EPSS 0.01%
- Veröffentlicht 13.02.2024 20:15:52
- Zuletzt bearbeitet 14.03.2025 18:15:25
Improper Access Control in the AMD SPI protection feature may allow a user with Ring0 (kernel mode) privileged access to bypass protections potentially resulting in loss of integrity and availability.
CVE-2023-4969
- EPSS 0.91%
- Veröffentlicht 16.01.2024 17:15:08
- Zuletzt bearbeitet 20.06.2025 18:15:22
A GPU kernel can read sensitive data from another GPU kernel (even from another user or app) through an optimized GPU memory region called _local memory_ on various architectures.
CVE-2021-46758
- EPSS 0.13%
- Veröffentlicht 14.11.2023 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:34:39
Insufficient validation of SPI flash addresses in the ASP (AMD Secure Processor) bootloader may allow an attacker to read data in memory mapped beyond SPI flash resulting in a potential loss of availability and integrity.
CVE-2022-23820
- EPSS 0.18%
- Veröffentlicht 14.11.2023 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:49:18
Failure to validate the AMD SMM communication buffer may allow an attacker to corrupt the SMRAM potentially leading to arbitrary code execution.
CVE-2022-23821
- EPSS 0.34%
- Veröffentlicht 14.11.2023 19:15:10
- Zuletzt bearbeitet 21.11.2024 06:49:18
Improper access control in System Management Mode (SMM) may allow an attacker to write to SPI ROM potentially leading to arbitrary code execution.
CVE-2023-20555
- EPSS 0.05%
- Veröffentlicht 08.08.2023 18:15:11
- Zuletzt bearbeitet 21.11.2024 07:41:06
Insufficient input validation in CpmDisplayFeatureSmm may allow an attacker to corrupt SMM memory by overwriting an arbitrary bit in an attacker-controlled pointer potentially leading to arbitrary code execution in SMM.
CVE-2022-27672
- EPSS 0.15%
- Veröffentlicht 01.03.2023 08:15:10
- Zuletzt bearbeitet 21.11.2024 06:56:08
When SMT is enabled, certain AMD processors may speculatively execute instructions using a target from the sibling thread after an SMT mode switch potentially resulting in information disclosure.
CVE-2022-23824
- EPSS 0.03%
- Veröffentlicht 09.11.2022 21:15:13
- Zuletzt bearbeitet 21.11.2024 06:49:19
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
CVE-2021-46778
- EPSS 0.13%
- Veröffentlicht 10.08.2022 20:15:24
- Zuletzt bearbeitet 21.11.2024 06:34:42
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues ...