Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2020-12966

Summary
Assigner-AMD
Assigner Org ID-b58fc414-a1e4-4f92-9d70-1add41838648
Published At-04 Feb, 2022 | 22:29
Updated At-17 Sep, 2024 | 01:06
Rejected At-
Credits

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:AMD
Assigner Org ID:b58fc414-a1e4-4f92-9d70-1add41838648
Published At:04 Feb, 2022 | 22:29
Updated At:17 Sep, 2024 | 01:06
Rejected At:
▼CVE Numbering Authority (CNA)

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.

Affected Products
Vendor
Advanced Micro Devices, Inc.AMD
Product
1st/2nd/3rd Gen AMD EPYC™ Processors
Versions
Affected
  • From unspecified before undefined (custom)
Problem Types
TypeCWE IDDescription
textN/ATBD
Type: text
CWE ID: N/A
Description: TBD
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
x_refsource_MISC
http://www.openwall.com/lists/oss-security/2022/08/08/6
mailing-list
x_refsource_MLIST
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
Resource:
x_refsource_MISC
Hyperlink: http://www.openwall.com/lists/oss-security/2022/08/08/6
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
x_refsource_MISC
x_transferred
http://www.openwall.com/lists/oss-security/2022/08/08/6
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.openwall.com/lists/oss-security/2022/08/08/6
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@amd.com
Published At:04 Feb, 2022 | 23:15
Updated At:26 Oct, 2022 | 02:32

AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to leaking guest data by the malicious hypervisor.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.15.5MEDIUM
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Primary2.02.1LOW
AV:L/AC:L/Au:N/C:P/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.5
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 2.0
Base score: 2.1
Base severity: LOW
Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CPE Matches

Advanced Micro Devices, Inc.
amd
>>epyc_7763_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7763>>-
cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713p_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713p>>-
cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7713>>-
cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7663_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7663>>-
cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7643_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7643>>-
cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_75f3_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_75f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_75f3>>-
cpe:2.3:h:amd:epyc_75f3:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543p_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7543p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543p>>-
cpe:2.3:h:amd:epyc_7543p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7543_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7543>>-
cpe:2.3:h:amd:epyc_7543:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7513_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7513_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7513>>-
cpe:2.3:h:amd:epyc_7513:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_74f3_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_74f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_74f3>>-
cpe:2.3:h:amd:epyc_74f3:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7453_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7453_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7453>>-
cpe:2.3:h:amd:epyc_7453:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443p_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7443p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443p>>-
cpe:2.3:h:amd:epyc_7443p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7443_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7443>>-
cpe:2.3:h:amd:epyc_7443:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7413_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7413_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7413>>-
cpe:2.3:h:amd:epyc_7413:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_73f3_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_73f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_73f3>>-
cpe:2.3:h:amd:epyc_73f3:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7343_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7343_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7343>>-
cpe:2.3:h:amd:epyc_7343:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313p_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7313p_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313p>>-
cpe:2.3:h:amd:epyc_7313p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7313_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7313>>-
cpe:2.3:h:amd:epyc_7313:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_72f3_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_72f3_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_72f3>>-
cpe:2.3:h:amd:epyc_72f3:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7003_firmware>>Versions before milanpi-sp3_1.0.0.5(exclusive)
cpe:2.3:o:amd:epyc_7003_firmware:*:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7003>>-
cpe:2.3:h:amd:epyc_7003:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7001_firmware>>-
cpe:2.3:o:amd:epyc_7001_firmware:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7001>>-
cpe:2.3:h:amd:epyc_7001:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7002_firmware>>-
cpe:2.3:o:amd:epyc_7002_firmware:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7002>>-
cpe:2.3:h:amd:epyc_7002:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7232p_firmware>>-
cpe:2.3:o:amd:epyc_7232p_firmware:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7232p>>-
cpe:2.3:h:amd:epyc_7232p:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7251_firmware>>-
cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7251>>-
cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7252_firmware>>-
cpe:2.3:o:amd:epyc_7252_firmware:-:*:*:*:*:*:*:*
Advanced Micro Devices, Inc.
amd
>>epyc_7252>>-
cpe:2.3:h:amd:epyc_7252:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-200Primarynvd@nist.gov
CWE ID: CWE-200
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.openwall.com/lists/oss-security/2022/08/08/6psirt@amd.com
Mailing List
Third Party Advisory
https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013psirt@amd.com
Mitigation
Vendor Advisory
Hyperlink: http://www.openwall.com/lists/oss-security/2022/08/08/6
Source: psirt@amd.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://www.amd.com/en/corporate/product-security/bulletin/amd-sb-1013
Source: psirt@amd.com
Resource:
Mitigation
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

1064Records found

CVE-2020-12987
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.20%
||
7 Day CHG~0.00%
Published-11 Jun, 2021 | 21:50
Updated-17 Sep, 2024 | 01:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A heap information leak/kernel pool address disclosure vulnerability in the AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwareradeon_pro_softwarewindows_10AMD Radeon Software
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2021-26333
Matching Score-10
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-10
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.34% / 55.92%
||
7 Day CHG~0.00%
Published-21 Sep, 2021 | 10:49
Updated-16 Sep, 2024 | 22:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Chipset Driver Information Disclosure Vulnerability

An information disclosure vulnerability exists in AMD Platform Security Processor (PSP) chipset driver. The discretionary access control list (DACL) may allow low privileged users to open a handle and send requests to the driver resulting in a potential data leak from uninitialized physical pages.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-chipset_driverpsp_driverPSP Driver
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-909
Missing Initialization of Resource
CVE-2022-23824
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 4.74%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:48
Updated-13 Feb, 2025 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.

Action-Not Available
Vendor-Xen ProjectFedora ProjectAdvanced Micro Devices, Inc.
Product-epyc_7543ryzen_5_3580uepyc_7402athlon_silver_3050u_firmwareepyc_7f32epyc_7713pepyc_7443epyc_7513athlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500uathlon_x4_940_firmwareryzen_9_5980hxryzen_5_5600hsathlon_x4_830_firmwareryzen_3_2300uryzen_7_5825uryzen_7_5825u_firmwareepyc_7542ryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7643_firmwareepyc_7f52ryzen_threadripper_pro_5945wxryzen_7_pro_3700u_firmwareepyc_7373x_firmwareryzen_5_2500u_firmwareryzen_3_4300g_firmwareepyc_7f32_firmwareryzen_7_3750hepyc_7001_firmwareepyc_75f3_firmwareepyc_7473x_firmwareryzen_3_2200u_firmwarea12-9730pepyc_7281ryzen_3_2200uepyc_7551p_firmwareryzen_threadripper_2920xepyc_7601_firmwareryzen_7_5825c_firmwareepyc_7573x_firmwareryzen_5_2600ryzen_7_2700x_firmwareryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401ryzen_3_5400uepyc_7713ryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_7_3780u_firmwareryzen_3_4300uepyc_7003ryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_5_3400g_firmwareathlon_x4_835_firmwareryzen_7_2700_firmwareryzen_5_5600h_firmwareryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareryzen_7_4700uepyc_7501a6-9220c_firmwareathlon_x4_970_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_3580u_firmwareryzen_5_4600hryzen_3_3200u_firmwareepyc_7443_firmwareathlon_x4_940athlon_x4_750_firmwareryzen_3_3300x_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwarea4-9120_firmwareepyc_7542_firmwareryzen_3_3300ua6-9210ryzen_threadripper_pro_5945wx_firmwareepyc_7313p_firmwareryzen_7_4800hepyc_7252ryzen_5_5600uryzen_5_3550h_firmwareryzen_5_3450gepyc_7502pepyc_7351p_firmwareryzen_9_4900hryzen_7_pro_3700ufedoraathlon_x4_840ryzen_7_3700u_firmwareathlon_x4_860k_firmwareryzen_7_2700u_firmwareryzen_5_2700epyc_7601ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_72f3_firmwareepyc_7662a10-9630p_firmwareepyc_7642ryzen_threadripper_pro_5975wx_firmwareepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7413ryzen_7_2700xepyc_7313ryzen_threadripper_pro_3955wxepyc_7663_firmwareryzen_3_3200uryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830epyc_7302pathlon_silver_3050uepyc_74f3_firmwareryzen_3_5425uryzen_5_4600gepyc_7763ryzen_threadripper_pro_3955wx_firmwareathlon_x4_835athlon_x4_845_firmwareepyc_7402_firmwareryzen_9_5980hx_firmwareepyc_7713p_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareathlon_x4_845ryzen_7_5825cryzen_7_5800uepyc_7251_firmwareepyc_7401_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xryzen_3_5425c_firmwareepyc_7351ryzen_7_5800hepyc_7543pryzen_threadripper_3970x_firmwareryzen_7_4800uepyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_7573xryzen_3_3100_firmwareryzen_threadripper_2950x_firmwarea9-9410_firmwareepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareepyc_7373xepyc_7513_firmwareryzen_5_3600x_firmwareryzen_7_3750h_firmwareepyc_7h12_firmwareryzen_threadripper_3960xryzen_5_5560uepyc_75f3epyc_7001ryzen_3_3100epyc_7502epyc_7f72_firmwareepyc_7662_firmwareepyc_7343_firmwareryzen_7_3780uepyc_7551athlon_x4_840_firmwareryzen_9_5900hsepyc_7551pepyc_7313pepyc_7002_firmwareryzen_9_5980hsathlon_x4_970a10-9630pathlon_x4_950_firmwareryzen_3_5125c_firmwareryzen_7_3800xt_firmwareryzen_7_2700ryzen_7_5800h_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xryzen_5_5625c_firmwareepyc_7352ryzen_5_5625cepyc_7713_firmwareepyc_7742epyc_7272ryzen_7_2700uryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geepyc_7003_firmwareepyc_7443p_firmwareryzen_7_2800hepyc_7773xryzen_5_2600x_firmwareryzen_5_5600hs_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_3_5400u_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_3800xepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7301_firmwareryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_5_5600hepyc_7763_firmwareryzen_3_5425cryzen_3_3300g_firmwareryzen_5_3600xtryzen_3_5425u_firmwareryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pepyc_7302p_firmwarea12-9700p_firmwareryzen_9_5900hx_firmwarea9-9420epyc_7642_firmwareryzen_threadripper_2970wxepyc_7452epyc_7h12a6-9220_firmwareepyc_7543p_firmwareryzen_5_2600xryzen_5_5625uryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gepyc_7302ryzen_3_5125cryzen_7_4700g_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareepyc_7773x_firmwareryzen_5_3600xepyc_7371epyc_7f72ryzen_7_3800xtryzen_threadripper_2970wx_firmwareepyc_7473xepyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7301epyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_7_5800u_firmwareryzen_7_4700u_firmwareepyc_7532a6-9220cepyc_7552athlon_x4_950epyc_7302_firmwarea6-9210_firmwarea9-9410ryzen_5_5560u_firmwareepyc_7262ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxxenryzen_9_5900hxryzen_3_3250uepyc_72f3epyc_7643athlon_gold_3150u_firmwareepyc_7452_firmwareryzen_3_3300gepyc_7313_firmwareepyc_7443pryzen_3_3250u_firmwareathlon_x4_880kryzen_5_3600ryzen_threadripper_pro_3945wxryzen_5_3500u_firmwareryzen_7_5800hs_firmwareryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_5_5625u_firmwareepyc_7352_firmwareepyc_74f3epyc_7702_firmwareAMD Processors
CVE-2022-23825
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.23% / 45.53%
||
7 Day CHG~0.00%
Published-14 Jul, 2022 | 19:27
Updated-16 Sep, 2024 | 17:48
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Aliases in the branch predictor may cause some AMD processors to predict the wrong branch type potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.VMware (Broadcom Inc.)Fedora ProjectDebian GNU/Linux
Product-epyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareathlon_silver_3050u_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7402epyc_7f32epyc_7551_firmwareepyc_7272_firmwareryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareathlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500ua9-9410_firmwareathlon_x4_940_firmwareepyc_7702ryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareathlon_x4_830_firmwareryzen_3_2300uryzen_5_3600x_firmwareepyc_7542ryzen_7_3750h_firmwareryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7h12_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7f52ryzen_threadripper_pro_5945wxryzen_5_2500u_firmwareepyc_7001ryzen_3_4300g_firmwareryzen_3_3100epyc_7f32_firmwaredebian_linuxepyc_7502ryzen_7_3750hepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwarea12-9730pryzen_3_2200u_firmwareathlon_x4_840_firmwareepyc_7281ryzen_3_2200uepyc_7551epyc_7551pepyc_7002_firmwareryzen_threadripper_2920xathlon_x4_970a10-9630pepyc_7551p_firmwareathlon_x4_950_firmwareryzen_7_3800xt_firmwareepyc_7601_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xepyc_7352ryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401epyc_7742ryzen_7_2700uepyc_7272ryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geryzen_7_2800hryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_3_4300uryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_5_2600x_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_7_2700_firmwareathlon_x4_835_firmwareryzen_5_3400g_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_4700uryzen_7_3800xa6-9220c_firmwareepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7501athlon_x4_970_firmwareepyc_7301_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_4600hryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_3_3200u_firmwareathlon_x4_750_firmwareathlon_x4_940ryzen_3_3300x_firmwareepyc_7402pepyc_7252_firmwarea4-9120_firmwareryzen_3_3300uepyc_7542_firmwarea6-9210ryzen_threadripper_pro_5945wx_firmwareryzen_3_3300g_firmwareryzen_5_3600xtryzen_5_3450gryzen_5_3550h_firmwareryzen_7_4800hepyc_7252epyc_7502pryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pryzen_9_4900ha12-9700p_firmwareepyc_7351p_firmwarea9-9420fedoraepyc_7302p_firmwareathlon_x4_840ryzen_threadripper_2970wxepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_3700u_firmwarea6-9220_firmwareathlon_x4_860k_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gryzen_5_2700epyc_7601epyc_7302ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_7_4700g_firmwareepyc_7552_firmwareryzen_5_3600xepyc_7371epyc_7f72epyc_7662a10-9630p_firmwareryzen_7_3800xtryzen_threadripper_pro_5975wx_firmwareryzen_threadripper_2970wx_firmwareepyc_7642epyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7301ryzen_7_2700xepyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_threadripper_pro_3955wxryzen_3_3200uryzen_7_4700u_firmwareryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830a6-9220cepyc_7302pepyc_7552athlon_silver_3050uathlon_x4_950ryzen_5_4600gepyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwarea6-9210_firmwareathlon_x4_835athlon_x4_845_firmwarea9-9410epyc_7402_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareepyc_7262athlon_x4_845ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxryzen_3_3250uepyc_7251_firmwareepyc_7401_firmwareathlon_gold_3150u_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xepyc_7452_firmwareepyc_7351ryzen_3_3300gryzen_threadripper_pro_3945wxathlon_x4_880kryzen_threadripper_3970x_firmwareryzen_3_3250u_firmwareryzen_5_3500u_firmwareryzen_5_3600ryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_7_4800uepyc_7352_firmwareepyc_7702_firmwareepyc_7532esxiAMD Processors
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2023-20593
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-6.32% / 90.59%
||
7 Day CHG~0.00%
Published-24 Jul, 2023 | 19:38
Updated-13 Feb, 2025 | 17:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in “Zen 2” CPUs, under specific microarchitectural circumstances, may allow an attacker to potentially access sensitive information.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Debian GNU/Linux
Product-epyc_7302pryzen_9_3950xryzen_3_pro_4350g_firmwareryzen_3_5300uepyc_7742_firmwareepyc_7702pepyc_7552_firmwareepyc_7f32_firmwareepyc_7f52_firmwareepyc_7272_firmwareepyc_7302p_firmwareryzen_7_5700u_firmwareepyc_7232p_firmwareryzen_threadripper_3960xepyc_7402epyc_7662epyc_7662_firmwareryzen_5_5500uryzen_9_3900xepyc_7452ryzen_threadripper_3990x_firmwareepyc_7542epyc_7f72ryzen_3_4300g_firmwareryzen_7_pro_4750geryzen_threadripper_pro_3975wx_firmwareathlon_gold_7220uryzen_3_pro_4350ge_firmwareepyc_7262_firmwareepyc_7f72_firmwareepyc_7f52ryzen_9_3900_firmwareryzen_3_pro_4200g_firmwareryzen_7_3800xryzen_7_4700gryzen_3_4300gepyc_7402p_firmwareryzen_7_4700g_firmwareepyc_7282_firmwareepyc_7282ryzen_7_3800x_firmwareryzen_9_3950x_firmwareryzen_3_3300x_firmwareryzen_5_3500_firmwareepyc_7702ryzen_5_pro_4650gepyc_7272epyc_7532_firmwareryzen_7_3700x_firmwareepyc_7352_firmwareryzen_threadripper_3990xepyc_7302epyc_7352ryzen_7_4700geepyc_7232pathlon_gold_7220u_firmwareryzen_7_5700uryzen_threadripper_3970x_firmwareryzen_5_pro_4650g_firmwareepyc_7252ryzen_3_pro_4450u_firmwareepyc_7552ryzen_9_pro_3900_firmwareryzen_5_3600xt_firmwareryzen_3_3100_firmwareryzen_5_7520u_firmwareryzen_7_3800xtepyc_7542_firmwareryzen_3_4300ge_firmwareryzen_3_pro_4200gepyc_7h12epyc_7502ryzen_3_3300xepyc_7452_firmwareryzen_5_3600x_firmwareryzen_5_3500ryzen_threadripper_pro_3955wxryzen_threadripper_pro_3995wxxenryzen_7_pro_4750g_firmwareryzen_7_pro_4750ge_firmwareepyc_7642ryzen_3_7320uepyc_7702p_firmwareepyc_7502pryzen_5_pro_4400g_firmwareryzen_threadripper_pro_3945wx_firmwareepyc_7502p_firmwareryzen_9_pro_3900ryzen_7_3700xepyc_7252_firmwareryzen_5_pro_4650ge_firmwareryzen_threadripper_3960x_firmwareryzen_5_3600xtryzen_5_3600xryzen_3_7320u_firmwareryzen_3_4300geryzen_9_3900xt_firmwareryzen_5_7520uepyc_7302_firmwareepyc_7502_firmwareryzen_7_3800xt_firmwareryzen_5_3500xryzen_5_4600ge_firmwareryzen_7_pro_4750gepyc_7f32ryzen_5_pro_4650geepyc_7402pryzen_threadripper_pro_3945wxepyc_7642_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_3_pro_4350gryzen_threadripper_pro_3975wxryzen_3_pro_4450uryzen_9_3900x_firmwareepyc_7532ryzen_7_pro_4750u_firmwareryzen_threadripper_pro_3955wx_firmwareepyc_7742ryzen_5_3600_firmwareryzen_9_3900xtryzen_5_3500x_firmwareryzen_7_4700ge_firmwareryzen_5_4600geryzen_5_4600g_firmwareryzen_3_5300u_firmwareryzen_5_3600ryzen_threadripper_3970xryzen_3_3100ryzen_7_pro_4750uepyc_7702_firmwareryzen_5_4600gepyc_7402_firmwareryzen_9_3900ryzen_5_5500u_firmwaredebian_linuxryzen_5_pro_4400gepyc_7h12_firmwareryzen_3_pro_4350geepyc_72622nd Gen AMD EPYC™ ProcessorsRyzen™ 5000 Series Mobile processors with Radeon™ Graphics “Lucienne”Ryzen™ 3000 Series Desktop Processors “Matisse” AM4Ryzen™ 4000 Series Mobile processors with Radeon™ Graphics “Renoir”Ryzen™ 7020 Series processors “Mendocino” FT6Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP33rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTAMD Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics “Renoir” AM4
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2023-20597
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 24.75%
||
7 Day CHG+0.03%
Published-20 Sep, 2023 | 17:32
Updated-27 Jun, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper initialization of variables in the DXE driver may allow a privileged user to leak sensitive information via local access.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_6600hryzen_3_3500uryzen_threadripper_3970xryzen_3800x_firmwareryzen_3_3250c_firmwareryzen_5_5600ge_firmwareryzen_3600xryzen_4300geryzen_3900xt_firmwareryzen_3_3200gryzen_5_5700ge_firmwareryzen_3_3350uryzen_threadripper_pro_3945wxryzen_4700g_firmwareryzen_5600gryzen_4300ge_firmwareryzen_5_5560uryzen_3_3550h_firmwareryzen_5_5500u_firmwareryzen_3_3300ryzen_5995wxryzen_3_3100_firmwareryzen_3100ryzen_5_5600hs_firmwareryzen_3995wxryzen_3800xryzen_3_3580uryzen_5600ryzen_6800h_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_3100_firmwareryzen_5500_firmwareryzen_3800xtryzen_5700geryzen_3_3300g_firmwareryzen_3_3500u_firmwareryzen_3970x_firmwareryzen_4700gryzen_threadripper_3990xryzen_5_5700gryzen_4600gryzen_3_3350u_firmwareryzen_3955wxryzen_5_5700g_firmwareryzen_3975wx_firmwareryzen_3_3300_firmwareryzen_3500xryzen_3_3250uryzen_5800x3d_firmwareryzen_3900xtryzen_5700xryzen_5950x_firmwareryzen_3_3200g_firmwareryzen_3900ryzen_5_5625c_firmwareryzen_3_3300u_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_6800hsryzen_3_3750hryzen_5700x_firmwareryzen_5955wxryzen_3600_firmwareryzen_5995wx_firmwareryzen_5600ge_firmwareryzen_5900xryzen_4600geryzen_5_5600hryzen_3_3700cryzen_3_3700uryzen_3500ryzen_5500ryzen_5900x_firmwareryzen_6900hsryzen_3_3200ge_firmwareryzen_3990x_firmwareryzen_6600uryzen_6980hxryzen_4300gryzen_3300xryzen_5975wx_firmwareryzen_3995wx_firmwareryzen_3300x_firmwareryzen_5900ryzen_5_5600uryzen_3975wxryzen_5700g_firmwareryzen_5_5600_firmwareryzen_5800_firmwareryzen_3600ryzen_5_5600g_firmwareryzen_3945wx_firmwareryzen_5700gryzen_3_3550hryzen_5950xryzen_5965wxryzen_5_5600geryzen_3950x_firmwareryzen_5_5625uryzen_5300gryzen_threadripper_3970x_firmwareryzen_5300g_firmwareryzen_5_5600x_firmwareryzen_6600u_firmwareryzen_5600_firmwareryzen_6900hx_firmwareryzen_6800hryzen_6600hsryzen_5300geryzen_5_5600xryzen_3900xryzen_3_3300uryzen_3945wxryzen_3970xryzen_threadripper_pro_3975wx_firmwareryzen_3600xtryzen_5_5600h_firmwareryzen_3_3500cryzen_5800x3dryzen_3_3200geryzen_5800x_firmwareryzen_threadripper_pro_3795wxryzen_3_3200u_firmwareryzen_3_3250u_firmwareryzen_3_3500c_firmwareryzen_5_5560u_firmwareryzen_threadripper_pro_3795wx_firmwareryzen_3_3250cryzen_5600g_firmwareryzen_6600h_firmwareryzen_5_5600x3dryzen_3955wx_firmwareryzen_threadripper_3960x_firmwareryzen_6900hxryzen_4700ge_firmwareryzen_3_3780u_firmwareryzen_3_3700c_firmwareryzen_5600geryzen_4600ge_firmwareryzen_5600x_firmwareryzen_5900_firmwareryzen_5_5500_firmwareryzen_5_5600hsryzen_3960xryzen_4300g_firmwareryzen_3_3700u_firmwareryzen_3900x_firmwareryzen_3900_firmwareryzen_3_3200uryzen_6900hs_firmwareryzen_6980hx_firmwareryzen_6800u_firmwareryzen_6980hs_firmwareryzen_threadripper_pro_3975wxryzen_3_3780uryzen_3950xryzen_5_5600u_firmwareryzen_3_3300gryzen_4700geryzen_5955wx_firmwareryzen_5965wx_firmwareryzen_5800xryzen_5_5600gryzen_3600xt_firmwareryzen_3_3580u_firmwareryzen_5600xryzen_threadripper_pro_3995wxryzen_3_3300xryzen_3_3100ryzen_3500_firmwareryzen_3990xryzen_4700sryzen_6980hsryzen_5_5600ryzen_5945wxryzen_5700ge_firmwareryzen_4600g_firmwareryzen_5_5600x3d_firmwareryzen_5945wx_firmwareryzen_6600hs_firmwareryzen_3_3450u_firmwareryzen_threadripper_pro_3955wx_firmwareryzen_3600x_firmwareryzen_threadripper_3990x_firmwareryzen_6800hs_firmwareryzen_5300ge_firmwareryzen_3_3300x_firmwareryzen_3_3750h_firmwareryzen_6800uryzen_5_5500uryzen_3_3450uryzen_threadripper_pro_3955wxryzen_3800xt_firmwareryzen_4700s_firmwareryzen_5_5500ryzen_5_5625cryzen_3960x_firmwareryzen_3500x_firmwareryzen_threadripper_3960xryzen_5975wxryzen_5800ryzen_5_5625u_firmwareryzen_5_5700geRyzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS SP3AMD Ryzen™ Embedded V3000Ryzen™ Threadripper™ PRO Processors “Castle Peak” WS SP3Ryzen™ 5000 Series Desktop Processor with Radeon™ Graphics “Cezanne”Ryzen™ 7035 Series Mobile Processors with Radeon™ Graphics "Rembrandt-R"Ryzen™ Threadripper™ 3000 Series Processors “Castle Peak” HEDTRyzen™ 7030 Series Mobile Processors with Radeon™ Graphics “Barcelo-R”AMD Ryzen™ Embedded 5000AMD EPYC™ Embedded 7003AMD Ryzen™ Embedded V2000Ryzen™ 6000 Series Mobile Processors with Radeon™ Graphics "Rembrandt"Ryzen™ 5000 Series Mobile Processors with Radeon™ Graphics "Barcelo"Ryzen™ 3000 Series Desktop Processors “Matisse”Ryzen™ 5000 Series Desktop Processors “Vermeer”
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-824
Access of Uninitialized Pointer
CVE-2023-20588
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-4.00% / 87.96%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:06
Updated-17 Oct, 2024 | 14:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Speculative Leaks

A division-by-zero error on some AMD processors can potentially return speculative data resulting in loss of confidentiality. 

Action-Not Available
Vendor-Debian GNU/LinuxMicrosoft CorporationXen ProjectFedora ProjectAdvanced Micro Devices, Inc.
Product-windows_server_2022_23h2athlon_gold_pro_3150ge_firmwareryzen_3_pro_3200ge_firmwareepyc_7371_firmwareepyc_7261epyc_7451ryzen_5_pro_3400g_firmwareryzen_3_3200gewindows_11_21h2epyc_7551_firmwareryzen_5_pro_3350ge_firmwareathlon_silver_pro_3125ge_firmwarewindows_10_21h2epyc_7351p_firmwareathlon_pro_300gefedoraathlon_gold_pro_3150gwindows_10_22h2epyc_7571_firmwareryzen_5_pro_3400gepyc_7401pryzen_5_3400gepyc_7281_firmwareathlon_silver_pro_3125geepyc_7601ryzen_5_pro_3350geryzen_3_pro_3200geryzen_3_pro_3200g_firmwareepyc_7371athlon_pro_300ge_firmwareryzen_3_3200g_firmwareryzen_3_pro_3200gathlon_silver_3050gedebian_linuxepyc_7451_firmwareryzen_3_3200gepyc_7281epyc_7551windows_11_22h2epyc_7301epyc_7551pwindows_server_2008epyc_7401p_firmwareathlon_gold_3150gwindows_server_2016athlon_silver_3050ge_firmwarewindows_server_2012epyc_7351pepyc_7551p_firmwarewindows_10_1507ryzen_5_pro_3350g_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7401epyc_7571athlon_gold_pro_3150gexenwindows_10_1607athlon_gold_pro_3150g_firmwareathlon_gold_3150geepyc_7251_firmwareepyc_7401_firmwareryzen_5_pro_3400geryzen_5_pro_3350gryzen_3_3200ge_firmwareryzen_5_3400g_firmwareepyc_7351epyc_7261_firmwarewindows_11_23h2windows_10_1809ryzen_5_pro_3400ge_firmwareathlon_gold_3150ge_firmwareepyc_7501epyc_7501_firmwareathlon_gold_3150g_firmwareepyc_7301_firmwarewindows_server_2019Athlon™ PRO 3000 Series Processors with Radeon™ Vega Graphics EPYC™ 7001 ProcessorsRyzen™ PRO 3000 Series Processors with Radeon™ Vega GraphicsAthlon™ 3000 Series Processors with Radeon™ Graphics Ryzen™ 3000 Series Processors with Radeon™ Graphics
CWE ID-CWE-369
Divide By Zero
CVE-2021-46744
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.09% / 26.53%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 16:40
Updated-16 Sep, 2024 | 23:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An attacker with access to a malicious hypervisor may be able to infer data values used in a SEV guest on AMD CPUs by monitoring ciphertext values over time.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_embedded_7f72_firmwareepyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareepyc_embedded_7371_firmwareepyc_embedded_7501epyc_7261epyc_7451epyc_7282_firmwareepyc_embedded_7f32epyc_embedded_3251_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_embedded_7282epyc_7713pepyc_embedded_7451epyc_7443epyc_7513epyc_embedded_3201_firmwareepyc_embedded_7502p_firmwareepyc_embedded_7542_firmwareepyc_7232p_firmwareepyc_7702epyc_embedded_7702pepyc_7453epyc_7513_firmwareepyc_embedded_7262epyc_7542epyc_embedded_740p_firmwareepyc_7281_firmwareepyc_7413_firmwareepyc_7002epyc_7643_firmwareepyc_embedded_3151_firmwareepyc_7001epyc_embedded_7642_firmwareepyc_7502epyc_7001_firmwareepyc_7662_firmwareepyc_7343_firmwareepyc_7281epyc_7551epyc_embedded_740pepyc_embedded_7662epyc_7551pepyc_7313pepyc_7002_firmwareepyc_embedded_3101epyc_embedded_7302epyc_embedded_7642epyc_7551p_firmwareepyc_embedded_7551_firmwareepyc_embedded_7f32_firmwareepyc_embedded_7h12epyc_7601_firmwareepyc_embedded_3451_firmwareepyc_7352epyc_embedded_7301epyc_embedded_7401_firmwareepyc_7401epyc_7713_firmwareepyc_7742epyc_embedded_7252_firmwareepyc_7272epyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_embedded_7742_firmwareepyc_7003epyc_embedded_3351_firmwareepyc_embedded_7402_firmwareepyc_embedded_7402p_firmwareepyc_embedded_3451epyc_embedded_7261epyc_embedded_7352_firmwareepyc_7261_firmwareepyc_embedded_7301_firmwareepyc_embedded_7232p_firmwareepyc_embedded_3201epyc_embedded_7532epyc_embedded_7302pepyc_embedded_7h12_firmwareepyc_7742_firmwareepyc_embedded_7261_firmwareepyc_7501epyc_7501_firmwareepyc_embedded_7452epyc_embedded_7272epyc_embedded_7552epyc_7301_firmwareepyc_embedded_7502pepyc_embedded_7371epyc_embedded_7451_firmwareepyc_7443_firmwareepyc_7402pepyc_7343epyc_embedded_7742epyc_7252_firmwareepyc_7543_firmwareepyc_embedded_7501_firmwareepyc_embedded_755pepyc_7542_firmwareepyc_7763_firmwareepyc_embedded_7302p_firmwareepyc_embedded_7502_firmwareepyc_embedded_7232pepyc_embedded_735pepyc_embedded_7351_firmwareepyc_7313p_firmwareepyc_7252epyc_7502pepyc_embedded_7252epyc_7302p_firmwareepyc_7351p_firmwareepyc_embedded_7f52_firmwareepyc_embedded_3251epyc_embedded_755p_firmwareepyc_embedded_3101_firmwareepyc_7642_firmwareepyc_embedded_7532_firmwareepyc_7452epyc_embedded_7601_firmwareepyc_7543p_firmwareepyc_embedded_7402epyc_7401pepyc_embedded_7f72epyc_7302epyc_7601epyc_embedded_3255_firmwareepyc_embedded_7601epyc_7232pepyc_embedded_7302_firmwareepyc_embedded_7401epyc_7663epyc_7552_firmwareepyc_embedded_3351epyc_embedded_7702_firmwareepyc_7371epyc_embedded_7251_firmwareepyc_7662epyc_7642epyc_7451_firmwareepyc_7532_firmwareepyc_embedded_7281_firmwareepyc_embedded_7542epyc_7502p_firmwareepyc_embedded_7662_firmwareepyc_7413epyc_7301epyc_7401p_firmwareepyc_embedded_7551epyc_7313epyc_7351pepyc_embedded_7282_firmwareepyc_7663_firmwareepyc_embedded_7702p_firmwareepyc_7351_firmwareepyc_7251epyc_7552epyc_7302pepyc_7702p_firmwareepyc_embedded_7552_firmwareepyc_7302_firmwareepyc_7763epyc_embedded_3151epyc_embedded_3255epyc_7402_firmwareepyc_7713p_firmwareepyc_embedded_7402pepyc_7702pepyc_embedded_7281epyc_embedded_7262_firmwareepyc_7262epyc_embedded_7352epyc_embedded_7702epyc_embedded_7452_firmwareepyc_7251_firmwareepyc_7401_firmwareepyc_embedded_7251epyc_7643epyc_embedded_735p_firmwareepyc_7402p_firmwareepyc_7452_firmwareepyc_7351epyc_7313_firmwareepyc_7543pepyc_embedded_7272_firmwareepyc_7443pepyc_7453_firmwareepyc_7282epyc_embedded_7f52epyc_embedded_7502epyc_7702_firmwareepyc_7352_firmwareepyc_7532epyc_embedded_7351AMD Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-12912
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.95% / 75.43%
||
7 Day CHG~0.00%
Published-12 Nov, 2020 | 19:08
Updated-04 Aug, 2024 | 12:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A potential vulnerability in the AMD extension to Linux "hwmon" service may allow an attacker to use the Linux-based Running Average Power Limit (RAPL) interface to show various side channel attacks. In line with industry partners, AMD has updated the RAPL interface to require privileged access.

Action-Not Available
Vendor-n/aAdvanced Micro Devices, Inc.
Product-energy_driver_for_linuxAMD extension to Linux "hwmon" for Zen1 platforms
CWE ID-CWE-749
Exposed Dangerous Method or Function
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-12897
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.85%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:44
Updated-16 Sep, 2024 | 17:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Kernel Pool Address disclosure in AMD Graphics Driver for Windows 10 may lead to KASLR bypass.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CVE-2020-12904
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.66%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 15:12
Updated-16 Sep, 2024 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004203 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-26342
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-3.3||LOW
EPSS-0.07% / 23.17%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 16:21
Updated-16 Sep, 2024 | 16:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In SEV guest VMs, the CPU may fail to flush the Translation Lookaside Buffer (TLB) following a particular sequence of operations that includes creation of a new virtual machine control block (VMCB). The failure to flush the TLB may cause the microcode to use stale TLB translations which may allow for disclosure of SEV guest memory contents. Users of SEV-ES/SEV-SNP guest VMs are not impacted by this vulnerability.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7443_firmwareepyc_7371_firmwareepyc_7343epyc_7261epyc_7543_firmwareepyc_7451epyc_7763_firmwareepyc_7551_firmwareepyc_7713pepyc_7573xepyc_7443epyc_7513epyc_7313p_firmwareepyc_7351p_firmwareepyc_7453epyc_7373xepyc_7513_firmwareepyc_7543p_firmwareepyc_7401pepyc_7281_firmwareepyc_7413_firmwareepyc_7601epyc_7643_firmwareepyc_7663epyc_7773x_firmwareepyc_75f3epyc_72f3_firmwareepyc_7373x_firmwareepyc_7371epyc_7001epyc_75f3_firmwareepyc_7473xepyc_7001_firmwareepyc_7451_firmwareepyc_7473x_firmwareepyc_7343_firmwareepyc_7281epyc_7551epyc_7413epyc_7301epyc_7551pepyc_7401p_firmwareepyc_7313pepyc_7313epyc_7351pepyc_7551p_firmwareepyc_7663_firmwareepyc_7601_firmwareepyc_7573x_firmwareepyc_7251epyc_7351_firmwareepyc_74f3_firmwareepyc_7763epyc_7713_firmwareepyc_7401epyc_7713p_firmwareepyc_73f3_firmwareepyc_7713epyc_7443p_firmwareepyc_7773xepyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_7351epyc_7261_firmwareepyc_7543pepyc_7313_firmwareepyc_7443pepyc_7453_firmwareepyc_7501epyc_7501_firmwareepyc_74f3epyc_7301_firmwareepyc_73f3EPYC™ Processors
CVE-2021-26337
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 34.51%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 18:24
Updated-17 Sep, 2024 | 03:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareryzen_5800x_firmwareepyc_7282_firmwareepyc_7f32epyc_7272_firmwareepyc_7713pryzen_3_3100_firmwareepyc_7443epyc_7513ryzen_threadripper_2950x_firmwareryzen_5600gryzen_9_3900xryzen_pro_3200g_firmwareepyc_7232p_firmwareryzen_9_5980hxepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareryzen_5_5600xryzen_pro_3400g_firmwareryzen_pro_3700_firmwareryzen_threadripper_pro_5995wxepyc_7453ryzen_5_5600hsryzen_pro_5750geryzen_7_5825uepyc_7513_firmwareryzen_7_5825u_firmwareryzen_pro_5650geryzen_5_3600x_firmwareepyc_7542ryzen_5_3400gepyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_threadripper_pro_3975wxepyc_7002epyc_7643_firmwareryzen_5900xepyc_7f52ryzen_5300ge_firmwareepyc_75f3ryzen_threadripper_pro_5945wxryzen_pro_5650g_firmwareryzen_5700gepyc_7f32_firmwareryzen_3_3100epyc_7502epyc_75f3_firmwareepyc_7662_firmwareepyc_7f72_firmwareepyc_7343_firmwareryzen_9_5900hsryzen_5300g_firmwareryzen_pro_3200geepyc_7313pepyc_7002_firmwareryzen_threadripper_2920xryzen_9_5980hsryzen_7_5800h_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_pro_5750g_firmwareryzen_7_3700xryzen_3_3300xryzen_5950x_firmwareepyc_7352ryzen_pro_5350gepyc_7713_firmwareepyc_7742epyc_7272ryzen_5_3450g_firmwareryzen_3_5400uepyc_7713epyc_7003_firmwareepyc_7443p_firmwareryzen_pro_3900_firmwareryzen_threadripper_3990x_firmwareryzen_pro_3200gepyc_7003ryzen_pro_3700ryzen_5_5600x_firmwareryzen_5700g_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_5900x_firmwareryzen_5300gryzen_5700geryzen_threadripper_3990xryzen_5_5600hs_firmwareryzen_5_3400g_firmwareryzen_5800x3d_firmwareryzen_5_5600h_firmwareryzen_threadripper_pro_5955wxryzen_3_5400u_firmwareepyc_7742_firmwareryzen_7_3800xryzen_pro_5350g_firmwareryzen_5_3600_firmwareryzen_pro_5650ge_firmwareryzen_threadripper_2990wx_firmwareepyc_7443_firmwareryzen_5_5600hepyc_7402pepyc_7343ryzen_5600x_firmwareepyc_7252_firmwareepyc_7543_firmwareryzen_3_3300x_firmwareepyc_7542_firmwareepyc_7763_firmwareryzen_threadripper_pro_5945wx_firmwareryzen_3_5425u_firmwareryzen_3_3300g_firmwareepyc_7313p_firmwareryzen_5_3450gepyc_7252epyc_7502pryzen_5600geryzen_5_5600uryzen_threadripper_pro_5975wxepyc_7302p_firmwareryzen_9_5900hx_firmwareryzen_pro_3900epyc_7642_firmwareryzen_threadripper_2970wxryzen_5600ge_firmwareepyc_7452epyc_7543p_firmwareryzen_5_5625uryzen_threadripper_2920x_firmwareryzen_5600g_firmwareryzen_pro_3600_firmwareepyc_7302ryzen_7_3800x_firmwareryzen_pro_5750ge_firmwareryzen_pro_3400ge_firmwareepyc_7232pryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareryzen_5_3600xepyc_72f3_firmwareryzen_pro_3350gepyc_7f72epyc_7662epyc_7642ryzen_threadripper_2970wx_firmwareryzen_threadripper_pro_5975wx_firmwareryzen_5800xryzen_9_3950x_firmwareryzen_5700ge_firmwareepyc_7532_firmwareryzen_pro_5350ge_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareepyc_7413ryzen_pro_3200ge_firmwareryzen_pro_5350geepyc_7313ryzen_pro_3350g_firmwareepyc_7663_firmwareryzen_threadripper_pro_3955wxryzen_7_5800u_firmwareryzen_9_3900x_firmwareepyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareryzen_3_5425uepyc_7763epyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwareryzen_5600xryzen_5300geepyc_7402_firmwareryzen_9_5980hx_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7702pryzen_threadripper_pro_3995wx_firmwareepyc_7f52_firmwareepyc_7262ryzen_5950xryzen_threadripper_pro_5965wxryzen_7_5800uryzen_pro_5650gryzen_9_5900hxepyc_72f3epyc_7643ryzen_5800x3dryzen_pro_3400geepyc_7402p_firmwareepyc_7452_firmwareryzen_threadripper_2990wxryzen_threadripper_3970xryzen_9_3950xryzen_pro_3600ryzen_3_3300gryzen_7_5800hepyc_7313_firmwareepyc_7543pryzen_pro_3400gepyc_7443pryzen_threadripper_3970x_firmwareryzen_5_3600ryzen_threadripper_pro_3945wxepyc_7453_firmwareryzen_threadripper_pro_3975wx_firmwareepyc_7282ryzen_7_5800hs_firmwareryzen_pro_5750gryzen_threadripper_pro_5995wx_firmwareepyc_7702_firmwareepyc_74f3epyc_7352_firmwareepyc_7532ryzen_5_5625u_firmwareepyc_73f3Athlon™ SeriesRyzen™ Series
CVE-2020-12901
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.85%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 19:20
Updated-17 Sep, 2024 | 03:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arbitrary Free After Use in AMD Graphics Driver for Windows 10 may lead to KASLR bypass or information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-416
Use After Free
CVE-2021-26361
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 33.10%
||
7 Day CHG~0.00%
Published-12 May, 2022 | 17:46
Updated-17 Sep, 2024 | 01:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A malicious or compromised User Application (UApp) or AGESA Boot Loader (ABL) could be used by an attacker to exfiltrate arbitrary memory from the ASP stage 2 bootloader potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-athlon_3150geryzen_5_5600hathlon_3150g_firmwareryzen_3_5425cryzen_3_5425u_firmwareathlon_3050geryzen_5_5600uryzen_5_2500uryzen_9_5980hxryzen_3_2300u_firmwareryzen_7_5800hsryzen_5_5600xryzen_9_5900hx_firmwareryzen_5_5600hsryzen_3_2300uryzen_7_5825uryzen_5_2600xryzen_7_2700u_firmwareryzen_5_5625uryzen_5_5700geryzen_7_5825u_firmwareryzen_3_5125cryzen_7_2800h_firmwareryzen_5_5700gryzen_9_5900hs_firmwareryzen_5_5560uryzen_5_5600u_firmwareryzen_5_2500u_firmwareryzen_3_2200u_firmwareryzen_9_5900hsryzen_3_2200uryzen_7_2700xryzen_5_5700g_firmwareryzen_9_5980hsryzen_3_5125c_firmwareryzen_7_5800u_firmwareryzen_7_5825c_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_7_5800h_firmwareryzen_5_5625c_firmwareryzen_3_5425uryzen_5_2600hryzen_5_5625cryzen_5_5700ge_firmwareryzen_5_5560u_firmwareryzen_9_5980hx_firmwareryzen_7_2700uryzen_3_5400uradeon_softwareryzen_7_5825cryzen_5_2600h_firmwareryzen_7_5800uryzen_7_2800hathlon_3150gryzen_9_5900hxryzen_5_2600x_firmwareryzen_5_5600x_firmwareryzen_9_5980hs_firmwareryzen_5_5600hs_firmwareryzen_3_5425c_firmwareryzen_7_2700_firmwareathlon_3150ge_firmwareryzen_5_5600h_firmwareryzen_7_5800hryzen_3_5400u_firmwareryzen_5_2600_firmwareryzen_7_5800hs_firmwareryzen_5_5625u_firmwareathlon_3050ge_firmwareAthlon™ SeriesRyzen™ Series
CVE-2021-26404
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 16.57%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-08 Apr, 2025 | 20:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7313epyc_7443_firmwareepyc_7343epyc_7663_firmwareepyc_7543_firmwareepyc_7763_firmwareepyc_7573x_firmwareepyc_7573xepyc_7713pepyc_7443epyc_74f3_firmwareepyc_7513epyc_7313p_firmwareepyc_7763epyc_7713_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7453epyc_7373xepyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_7513_firmwareepyc_7543p_firmwareepyc_7773xepyc_7003epyc_7413_firmwareepyc_7643epyc_7643_firmwareepyc_7663epyc_7773x_firmwareepyc_75f3epyc_7373x_firmwareepyc_7313_firmwareepyc_7543pepyc_7443pepyc_75f3_firmwareepyc_7473xepyc_7453_firmwareepyc_7343_firmwareepyc_7473x_firmwareepyc_74f3epyc_7413epyc_7313pepyc_73f33rd Gen EPYC
CWE ID-CWE-20
Improper Input Validation
CVE-2021-26371
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 19.16%
||
7 Day CHG~0.00%
Published-09 May, 2023 | 18:59
Updated-28 Jan, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A compromised or malicious ABL or UApp could send a SHA256 system call to the bootloader, which may result in exposure of ASP memory to userspace, potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_3_3250c_firmwareepyc_7552_firmwareryzen_5_5600_firmwareamd_3015ceepyc_7663ryzen_7_2700uryzen_threadripper_pro_5995wx_firmwareepyc_73f3_firmwareepyc_7402pepyc_74f3_firmwareepyc_73f3epyc_7252ryzen_7_3800xt_firmwareryzen_5_3500uryzen_7_3700uryzen_5_2500u_firmwareepyc_7352ryzen_3_3100_firmwareryzen_3_3250u_firmwareryzen_7_2800hepyc_7473xepyc_7501_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_threadripper_pro_5995wxryzen_9_3900xt_firmwareryzen_5_3450uryzen_9_5900x_firmwareryzen_5_3500epyc_7502epyc_7452ryzen_5_2400g_firmwareepyc_7002epyc_74f3epyc_7713pepyc_7251epyc_7551_firmwareryzen_5_3580u_firmwareryzen_7_3700c_firmwareepyc_7543ryzen_threadripper_3990xryzen_threadripper_pro_5955wxryzen_3_3250uepyc_7003epyc_7251_firmwareepyc_7351pryzen_9_5950xryzen_7_3700x_firmwareryzen_7_3800x_firmwareryzen_3_2200ge_firmwareryzen_7_2700u_firmwareryzen_5_2400geepyc_7373xepyc_7542_firmwareryzen_3_pro_2100geepyc_7373x_firmwareryzen_threadripper_pro_5975wx_firmwareepyc_72f3_firmwareepyc_7451_firmwareepyc_7773xepyc_7413epyc_7702p_firmwareryzen_5_5600x_firmwareepyc_7551ryzen_3_3350u_firmwareryzen_5_3550h_firmwareryzen_7_3700u_firmwareryzen_5_3550hepyc_7642_firmwareryzen_7_5800x3d_firmwareepyc_7262_firmwareepyc_7343ryzen_9_3950xepyc_7542epyc_7642ryzen_7_3780u_firmwareepyc_7272_firmwareepyc_7501ryzen_3_2200g_firmwareepyc_7401_firmwareryzen_5_5600ryzen_5_2400ge_firmwareepyc_7742epyc_72f3ryzen_threadripper_pro_5965wxryzen_threadripper_3990x_firmwareepyc_7601_firmwareepyc_7302pepyc_7763epyc_7413_firmwareepyc_7502_firmwareepyc_7313ryzen_3_3300xepyc_7443epyc_7302p_firmwareryzen_5_3580uepyc_7281epyc_7502p_firmwareepyc_7702pepyc_7001_firmwareryzen_3_2200geepyc_75f3ryzen_5_3500cryzen_threadripper_pro_5945wx_firmwareepyc_7313_firmwareryzen_threadripper_3970x_firmwareryzen_5_3500c_firmwareryzen_5_3600ryzen_3_pro_2100ge_firmwareryzen_9_5950x_firmwareepyc_7662_firmwareepyc_7f72ryzen_5_3600xryzen_3_2200uryzen_3_2300u_firmwareryzen_7_5700x_firmwareryzen_9_3900_firmwareepyc_7301_firmwareepyc_7451epyc_7282_firmwareepyc_7742_firmwareepyc_7371epyc_7532epyc_7313p_firmwareepyc_7262epyc_7h12ryzen_7_3750hepyc_7453ryzen_7_5800xepyc_7543_firmwareepyc_7552ryzen_3_2300uryzen_9_3900xryzen_5_5600xepyc_7351ryzen_5_3600xt_firmwareepyc_7302epyc_7f32_firmwareepyc_7573x_firmwareryzen_threadripper_pro_3995wx_firmwareepyc_7662ryzen_5_3500_firmwareepyc_7713p_firmwareepyc_7302_firmwareepyc_7702_firmwareepyc_7f52_firmwareryzen_9_3900xtepyc_7003_firmwareryzen_7_3700xryzen_threadripper_3960xepyc_7001ryzen_7_3800xtepyc_7513ryzen_5_2600h_firmwareryzen_5_3600x_firmwareryzen_3_2200gepyc_7402p_firmwareryzen_7_5800_firmwareepyc_7402epyc_7643epyc_7232p_firmwareepyc_7261ryzen_5_2500uryzen_3_3300uryzen_threadripper_3970xryzen_7_5800x3dryzen_9_5900_firmwareryzen_threadripper_pro_3955wxamd_3015ce_firmwareepyc_7702epyc_7h12_firmwareepyc_7452_firmwareryzen_threadripper_pro_5945wxepyc_7401pepyc_7543p_firmwareryzen_9_3900x_firmwareepyc_7272epyc_7513_firmwareryzen_5_3500xryzen_3_3300x_firmwareryzen_threadripper_pro_3945wxryzen_threadripper_3960x_firmwareryzen_3_3100epyc_7443pryzen_7_3700cryzen_7_3780uepyc_7f72_firmwareepyc_7301ryzen_3_3300u_firmwareryzen_5_3600xtepyc_7401epyc_7f52epyc_7f32epyc_7261_firmwareepyc_7402_firmwareepyc_7351_firmwareryzen_7_5700xepyc_75f3_firmwareryzen_5_3450u_firmwareamd_3015eryzen_5_3600_firmwareepyc_7443_firmwareepyc_7763_firmwareepyc_7401p_firmwareepyc_7252_firmwareryzen_5_2600hepyc_7643_firmwareepyc_7473x_firmwareepyc_7232pepyc_7532_firmwareepyc_7453_firmwareepyc_7351p_firmwareepyc_7551pryzen_3_3350uryzen_9_3900ryzen_5_5500_firmwareepyc_7543pryzen_9_3950x_firmwareryzen_3_2200u_firmwareryzen_9_5900ryzen_threadripper_pro_3955wx_firmwareryzen_3_3200u_firmwareryzen_5_3500x_firmwareryzen_threadripper_pro_3975wxryzen_threadripper_pro_3975wx_firmwareepyc_7551p_firmwareepyc_7663_firmwareepyc_7352_firmwareamd_3015e_firmwareryzen_7_2800h_firmwareryzen_threadripper_pro_3995wxryzen_7_5800epyc_7713_firmwareepyc_7371_firmwareepyc_7713epyc_7281_firmwareryzen_7_3750h_firmwareryzen_7_3800xepyc_7313pryzen_threadripper_pro_5975wxepyc_7773x_firmwareepyc_7573xepyc_7502pryzen_5_2400gepyc_7282ryzen_9_5900xryzen_5_3500u_firmwareryzen_5_5500epyc_7443p_firmwareepyc_7343_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3250cryzen_3_3200uepyc_7601epyc_7002_firmwareryzen_7_5800x_firmwareryzen_threadripper_pro_5955wx_firmwareRyzen™ 3000 Series Desktop Processors “Matisse” AM4Athlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Pollock”Ryzen™ Threadripper™ PRO Processors “Castle Peak” WSRyzen™ 2000 Series Mobile Processors “Raven Ridge” FP51st Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ ProcessorsAthlon™ 3000 Series Mobile Processors with Radeon™ Graphics “Dali”/”Dali” ULP3rd Gen AMD EPYC™ ProcessorsRyzen™ 2000 series Desktop Processors “Raven Ridge” AM4Ryzen™ Threadripper™ PRO Processors “Chagall” WSAMD Ryzen™ 5000 Series Desktop Processors “Vermeer” AM43rd Gen AMD Ryzen™ Threadripper™ Processors “Castle Peak” HEDTRyzen™ 3000 Series Mobile processor, 2nd Gen AMD Ryzen™ Mobile Processors with Radeon™ Graphics “Picasso”
CVE-2021-26312
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.05% / 13.96%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 17:55
Updated-16 Sep, 2024 | 17:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Failure to flush the Translation Lookaside Buffer (TLB) of the I/O memory management unit (IOMMU) may lead an IO device to write to memory it should not be able to access, resulting in a potential loss of integrity.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareepyc_7443_firmwareepyc_7402pepyc_7451epyc_7261epyc_7282_firmwareepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7f32epyc_7542_firmwareepyc_7551_firmwareepyc_7763_firmwareepyc_7272_firmwareepyc_7713pepyc_7443epyc_7513epyc_7313p_firmwareepyc_7252epyc_7502pepyc_7232p_firmwareepyc_7702epyc_7351p_firmwareepyc_7302p_firmwareepyc_7453epyc_7642_firmwareepyc_7h12epyc_7452epyc_7513_firmwareepyc_7543p_firmwareepyc_7542epyc_7281_firmwareepyc_7413_firmwareepyc_7h12_firmwareepyc_7601epyc_7302epyc_7232pepyc_7643_firmwareepyc_7f52epyc_7663epyc_7552_firmwareepyc_75f3epyc_7371epyc_72f3_firmwareepyc_7f72epyc_7f32_firmwareepyc_7662epyc_7f72_firmwareepyc_7662_firmwareepyc_7502epyc_75f3_firmwareepyc_7642epyc_7451_firmwareepyc_7343_firmwareepyc_7532_firmwareepyc_7551epyc_7281epyc_7502p_firmwareepyc_7413epyc_7301epyc_7551pepyc_7313pepyc_7313epyc_7351pepyc_7551p_firmwareepyc_7663_firmwareepyc_7601_firmwareepyc_7351_firmwareepyc_7251epyc_7532epyc_7552epyc_7302pepyc_7702p_firmwareepyc_74f3_firmwareepyc_7352epyc_7302_firmwareepyc_7763epyc_7401epyc_7713_firmwareepyc_7402_firmwareepyc_7742epyc_7713p_firmwareepyc_7272epyc_73f3_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262epyc_7713epyc_7443p_firmwareepyc_7251_firmwareepyc_7401_firmwareepyc_72f3epyc_7643epyc_7452_firmwareepyc_7402p_firmwareepyc_7351epyc_7261_firmwareepyc_7543pepyc_7313_firmwareepyc_7443pepyc_7742_firmwareepyc_7453_firmwareepyc_7282epyc_7501epyc_7501_firmwareepyc_7702_firmwareepyc_7352_firmwareepyc_74f3epyc_7301_firmwareepyc_73f3Athlon™ SeriesRyzen™ SeriesEPYC™ Processors
CWE ID-CWE-665
Improper Initialization
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26400
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-4||MEDIUM
EPSS-0.06% / 17.66%
||
7 Day CHG~0.00%
Published-11 May, 2022 | 16:36
Updated-17 Sep, 2024 | 04:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

AMD processors may speculatively re-order load instructions which can result in stale data being observed when multiple processors are operating on shared memory, resulting in potential data leakage.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-cpuAMD Processors
CVE-2021-26313
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.82%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-16 Sep, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative Code Store Bypass

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationDebian GNU/LinuxBroadcom Inc.Arm Limited
Product-debian_linuxcore_i7-7700kryzen_5_5600xxeon_silver_4214core_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-26393
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.12% / 31.44%
||
7 Day CHG~0.00%
Published-09 Nov, 2022 | 20:44
Updated-16 Sep, 2024 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient memory cleanup in the AMD Secure Processor (ASP) Trusted Execution Environment (TEE) may allow an authenticated attacker with privileges to generate a valid signed TA and potentially poison the contents of the process memory with attacker controlled data resulting in a loss of confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-amd_3020e_firmwareradeon_pro_w5500xryzen_5_3580uradeon_rx_vega_64ryzen_3_pro_3200ge_firmwareathlon_silver_3050u_firmwareathlon_silver_3050e_firmwareryzen_3_3250cradeon_rx_6600amd_3015eradeon_rx_5300ryzen_5_pro_3350ge_firmwareradeon_rx_vega_56ryzen_5_2500uathlon_gold_3150c_firmwareryzen_9_5980hxryzen_7_5800hsryzen_5_5600hsryzen_3_5300geryzen_3_2300uryzen_7_3750h_firmwareradeon_rx_6700sryzen_5_3400gradeon_rx_5700mamd_3020eathlon_pro_3145bryzen_5_5560uryzen_3_2200g_firmwareradeon_rx_5700ryzen_3_pro_3200geryzen_3_pro_3200g_firmwareryzen_5_2500u_firmwareradeon_rx_5700_xtryzen_3_pro_3200gryzen_7_3750hradeon_rx_5500mryzen_7_5700u_firmwareryzen_3_2200u_firmwareathlon_silver_3050eryzen_3_3200gryzen_7_3780uryzen_9_5900hsryzen_3_2200uradeon_rx_6500_xtryzen_3_3250c_firmwareradeon_rx_6950_xtryzen_7_5700gryzen_9_5980hsryzen_5_2400geryzen_7_3700cryzen_5_pro_3350g_firmwareryzen_5_5500u_firmwareryzen_7_5800h_firmwareenterprise_driverradeon_pro_softwareryzen_5_2600hryzen_5_3500uradeon_rx_5600mryzen_7_2700uryzen_3_5400uradeon_softwareathlon_pro_3045bryzen_7_2800hryzen_5_3550hradeon_rx_6700ryzen_7_3780u_firmwareradeon_rx_6400radeon_rx_6800athlon_silver_3050c_firmwareryzen_9_5980hs_firmwareryzen_5_pro_3350gryzen_3_5300gryzen_5_5600ge_firmwareryzen_5_3500c_firmwareryzen_5_3400g_firmwareryzen_5_5600hs_firmwareathlon_gold_3150uryzen_3_3350u_firmwareradeon_pro_w6800xradeon_rx_5600_xtryzen_5_5600h_firmwareryzen_5_5500uryzen_3_5400u_firmwareathlon_silver_3050cryzen_3_3300u_firmwareradeon_rx_6600sryzen_5_2400ge_firmwareryzen_5_2400gradeon_rx_6800sryzen_5_3580u_firmwareryzen_3_2200geryzen_5_3500cryzen_5_5600hryzen_5_pro_3400g_firmwareryzen_3_5300u_firmwareryzen_3_3300uryzen_3_5300uradeon_rx_6900_xtryzen_5_5600gryzen_5_3550h_firmwareryzen_5_5600uradeon_pro_w6400athlon_pro_3045b_firmwareryzen_3_2300u_firmwareradeon_rx_5500radeon_pro_w5700ryzen_9_5900hx_firmwareryzen_5_5600geradeon_rx_5300_xtryzen_7_3700u_firmwareryzen_3_5300ge_firmwareryzen_7_2700u_firmwareryzen_5_pro_3400gryzen_7_5700geryzen_5_3450uradeon_rx_6850m_xtryzen_3_2200ge_firmwareradeon_rx_6600_xtradeon_rx_6650_xtathlon_pro_3145b_firmwareryzen_7_2800h_firmwareryzen_5_pro_3350geryzen_7_5700uradeon_pro_w6600mradeon_pro_w6600xamd_3015ce_firmwareryzen_9_5900hs_firmwareradeon_pro_w6600ryzen_5_5600u_firmwareryzen_3_3200g_firmwareradeon_rx_6800_xtryzen_7_5700g_firmwareradeon_pro_w6900xradeon_rx_5300mradeon_pro_w6800radeon_rx_6600mradeon_pro_w5700xryzen_7_3700c_firmwareradeon_rx_6750_xtryzen_3_5300g_firmwareradeon_rx_5500_xtryzen_7_5800u_firmwareryzen_7_3700uathlon_silver_3050uryzen_3_2200gradeon_rx_6300mamd_3015ceryzen_5_5560u_firmwareryzen_9_5980hx_firmwareradeon_rx_6800mryzen_5_2600h_firmwareryzen_7_5800uradeon_rx_vega_56_firmwareradeon_rx_vega_64_firmwareryzen_9_5900hxradeon_pro_w6800x_duoradeon_rx_6650mradeon_rx_6650m_xtryzen_5_5600g_firmwareradeon_rx_6700_xtathlon_gold_3150cradeon_rx_6700mryzen_3_3250uryzen_5_2400g_firmwareathlon_gold_3150u_firmwareradeon_pro_w5500ryzen_5_pro_3400geradeon_rx_5600ryzen_7_5800hradeon_pro_w6500mryzen_5_3450u_firmwareamd_3015e_firmwareryzen_3_3250u_firmwareryzen_5_pro_3400ge_firmwareryzen_5_3500u_firmwareryzen_7_5800hs_firmwareradeon_pro_w6300mradeon_rx_6500mryzen_7_5700ge_firmwareryzen_3_3350uAMD Radeon RX 5000 Series & PRO W5000 SeriesAMD Ryzen™ Embedded V2000AMD Ryzen™ Embedded V1000AMD Radeon RX 6000 Series & PRO W6000 SeriesAMD Ryzen™ Embedded R2000AMD Ryzen™ Embedded R1000
CWE ID-CWE-401
Missing Release of Memory after Effective Lifetime
CVE-2020-12905
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.85%
||
7 Day CHG~0.00%
Published-15 Nov, 2021 | 19:40
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Out of Bounds Read in AMD Graphics Driver for Windows 10 in Escape 0x3004403 may lead to arbitrary information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft Corporation
Product-radeon_softwarewindows_10AMD Radeon Software
CWE ID-CWE-125
Out-of-bounds Read
CVE-2021-46766
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-2.5||LOW
EPSS-0.02% / 3.91%
||
7 Day CHG~0.00%
Published-14 Nov, 2023 | 18:51
Updated-04 Aug, 2024 | 05:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper clearing of sensitive data in the ASP Bootloader may expose secret keys to a privileged attacker accessing ASP SRAM, potentially leading to a loss of confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_9124_firmwareepyc_9684xepyc_9254_firmwareryzen_threadripper_pro_3955wxepyc_9354pepyc_9474fepyc_9754sepyc_9274fepyc_9734epyc_9454pepyc_9654pepyc_9684x_firmwareepyc_9734_firmwareepyc_9454_firmwareepyc_9384xryzen_threadripper_pro_3955wx_firmwareepyc_9534epyc_9374fepyc_9124epyc_9354epyc_9254epyc_9654p_firmwareryzen_threadripper_pro_3995wx_firmwareepyc_9334epyc_9474f_firmwareepyc_9374f_firmwareepyc_9334_firmwareepyc_9454p_firmwareepyc_9454epyc_9554_firmwareepyc_9534_firmwareepyc_9754_firmwareepyc_9384x_firmwareryzen_threadripper_pro_3975wxryzen_threadripper_pro_3945wx_firmwareepyc_9354_firmwareepyc_9274f_firmwareepyc_9634epyc_9554p_firmwareepyc_9354p_firmwareepyc_9224_firmwareepyc_9174fryzen_threadripper_pro_3945wxepyc_9184xepyc_9184x_firmwareepyc_9754ryzen_threadripper_pro_3975wx_firmwareepyc_9224epyc_9754s_firmwareryzen_threadripper_pro_3995wxepyc_9634_firmwareepyc_9554epyc_9174f_firmwareepyc_9654_firmwareepyc_9554pepyc_9654AMD EPYC™ Embedded 90034th Gen AMD EPYC™ ProcessorsRyzen™ Threadripper™ PRO 3000WX Series Processors “Chagall” WS
CWE ID-CWE-459
Incomplete Cleanup
CVE-2021-26343
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 10.79%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-09 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7313pepyc_7543epyc_7573xepyc_7663_firmwareepyc_7543p_firmwareepyc_7313_firmwareepyc_7313epyc_7413_firmwareepyc_7543pepyc_7643epyc_74f3epyc_7543_firmwareepyc_7443epyc_75f3epyc_7453epyc_7513epyc_7763_firmwareepyc_7343epyc_7773x_firmwareepyc_73f3_firmwareepyc_7713p_firmwareepyc_7713pepyc_7373xepyc_7443pepyc_7453_firmwareepyc_7773xepyc_7513_firmwareepyc_7713_firmwareepyc_72f3_firmwareepyc_7743epyc_7573x_firmwareepyc_7443p_firmwareepyc_73f3epyc_7763epyc_7313p_firmwareepyc_7743_firmwareepyc_7373x_firmwareepyc_7643_firmwareepyc_72f3epyc_74f3_firmwareepyc_75f3_firmwareepyc_7003_firmwareepyc_7713epyc_7343_firmwareepyc_7003epyc_7443_firmwareepyc_7413epyc_76633rd Gen EPYC
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26407
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.07% / 22.67%
||
7 Day CHG~0.00%
Published-10 Jan, 2023 | 20:56
Updated-08 Apr, 2025 | 20:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A randomly generated Initialization Vector (IV) may lead to a collision of IVs with the same key potentially resulting in information disclosure.

Action-Not Available
Vendor-AMDAdvanced Micro Devices, Inc.
Product-romepiromepi_firmware2nd Gen EPYC
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2021-26341
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.05% / 15.00%
||
7 Day CHG~0.00%
Published-11 Mar, 2022 | 17:54
Updated-16 Sep, 2024 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7502_firmwareepyc_7402epyc_7262_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareathlon_silver_3050u_firmwareepyc_7451epyc_7282_firmwareepyc_7261epyc_7f32epyc_7551_firmwareepyc_7272_firmwareryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareryzen_3_pro_3300uryzen_9_3900xryzen_5_pro_3500uathlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500ua9-9410_firmwareathlon_x4_940_firmwareryzen_9_5980hxepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareepyc_7232p_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_5600hsathlon_x4_830_firmwareryzen_3_2300uryzen_7_5825uryzen_7_5825u_firmwareryzen_5_3600x_firmwareepyc_7542ryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7h12_firmwareryzen_threadripper_2950xathlon_x4_760kepyc_7f52ryzen_threadripper_pro_5945wxryzen_7_pro_3700u_firmwareathlon_gold_3450g_firmwareryzen_5_2500u_firmwareryzen_3_4300g_firmwareryzen_3_3100athlon_silver_3050geepyc_7f32_firmwareepyc_7f72_firmwareepyc_7662_firmwareepyc_7502a12-9730pryzen_3_2200u_firmwareathlon_x4_840_firmwareryzen_9_5900hsryzen_3_2200uepyc_7551epyc_7281epyc_7551pryzen_9_4900hsathlon_silver_3050ge_firmwareryzen_threadripper_2920xathlon_x4_970a10-9630pryzen_9_5980hsepyc_7551p_firmwareathlon_x4_950_firmwareepyc_7601_firmwareryzen_5_2600ryzen_7_2700x_firmwareryzen_7_2700ryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xryzen_7_5800h_firmwareepyc_7352ryzen_5_2600hathlon_x4_750epyc_7401ryzen_5_pro_2500uepyc_7742ryzen_7_2700uepyc_7272ryzen_3_5400ua10-9600pryzen_9_4900hs_firmwareryzen_5_4600geryzen_7_2800hathlon_gold_3150geryzen_7_4800h_firmwareryzen_5_2600x_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_5_5600hs_firmwareryzen_7_2700_firmwareathlon_x4_835_firmwareryzen_5_3400g_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_5_5600h_firmwareryzen_threadripper_pro_5955wxryzen_3_4300geryzen_3_5400u_firmwareryzen_5_2600_firmwareepyc_7742_firmwareryzen_7_3800xa6-9220c_firmwareepyc_7501_firmwarea12-9730p_firmwareepyc_7501athlon_x4_970_firmwareryzen_3_pro_2300u_firmwareathlon_x4_870kepyc_7301_firmwareryzen_5_3600_firmwareryzen_5_4600hryzen_threadripper_2990wx_firmwareryzen_7_pro_2700uathlon_x4_940athlon_x4_750_firmwareryzen_3_3300x_firmwareryzen_5_5600hepyc_7402pepyc_7252_firmwarea4-9120_firmwareepyc_7542_firmwareryzen_5_pro_2500u_firmwarea6-9210ryzen_threadripper_pro_5945wx_firmwareryzen_3_3300g_firmwareryzen_3_5425u_firmwareryzen_7_4800hryzen_5_5600uepyc_7502pepyc_7252ryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pepyc_7302p_firmwarea12-9700p_firmwareryzen_7_pro_3700ua9-9420ryzen_9_5900hx_firmwareepyc_7351p_firmwareathlon_x4_840ryzen_threadripper_2970wxepyc_7642_firmwareepyc_7h12epyc_7452a6-9220_firmwareathlon_x4_860k_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_5_5625uryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gepyc_7302epyc_7601ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwareathlon_pro_300uepyc_7232pa10-9600p_firmwareryzen_9_5900hs_firmwareryzen_7_4700g_firmwareryzen_5_5600u_firmwareepyc_7552_firmwareryzen_5_3600xepyc_7371ryzen_5_pro_3500u_firmwareryzen_3_pro_3300u_firmwareepyc_7f72epyc_7662a10-9630p_firmwareryzen_threadripper_pro_5975wx_firmwareryzen_threadripper_2970wx_firmwareepyc_7642epyc_7451_firmwareryzen_9_3950x_firmwareepyc_7532_firmwareepyc_7502p_firmwareryzen_5_4600h_firmwareathlon_gold_3450gepyc_7301ryzen_7_2700xepyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_7_5800u_firmwareathlon_pro_300u_firmwareryzen_9_3900x_firmwareepyc_7351_firmwareepyc_7251athlon_x4_830a6-9220cepyc_7552epyc_7702p_firmwareepyc_7302pathlon_silver_3050uryzen_3_5425uathlon_x4_950ryzen_5_4600gepyc_7302_firmwarea6-9210_firmwareathlon_x4_835athlon_x4_845_firmwarea9-9410ryzen_9_5980hx_firmwareepyc_7402_firmwareathlon_x4_760k_firmwareepyc_7702pepyc_7f52_firmwareepyc_7262athlon_x4_845ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxryzen_7_5800uryzen_9_5900hxepyc_7251_firmwareepyc_7401_firmwareathlon_gold_3150u_firmwareathlon_x4_860kryzen_7_pro_2700u_firmwarea4-9120epyc_7452_firmwareryzen_threadripper_2990wxryzen_9_3950xryzen_threadripper_3970xryzen_3_4300ge_firmwareepyc_7402p_firmwareepyc_7351ryzen_3_3300gryzen_7_5800hryzen_3_pro_2300uryzen_threadripper_3970x_firmwareathlon_x4_880kryzen_5_3600ryzen_5_4600ge_firmwareryzen_7_5800hs_firmwareepyc_7282athlon_gold_3150ge_firmwareryzen_threadripper_pro_5995wx_firmwareryzen_5_5625u_firmwareepyc_7702_firmwareepyc_7352_firmwareepyc_7532AMD Processors
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2021-26327
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.06% / 18.85%
||
7 Day CHG~0.00%
Published-16 Nov, 2021 | 18:18
Updated-17 Sep, 2024 | 02:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-epyc_7543epyc_7313epyc_7443_firmwareepyc_7343epyc_7663_firmwareepyc_7543_firmwareepyc_7763_firmwareepyc_7713pepyc_7443epyc_74f3_firmwareepyc_7513epyc_7313p_firmwareepyc_7763epyc_7713_firmwareepyc_7713p_firmwareepyc_73f3_firmwareepyc_7453epyc_7713epyc_7003_firmwareepyc_7443p_firmwareepyc_7513_firmwareepyc_7543p_firmwareepyc_7003epyc_7413_firmwareepyc_72f3epyc_7643epyc_7643_firmwareepyc_7663epyc_75f3epyc_72f3_firmwareepyc_7313_firmwareepyc_7543pepyc_7443pepyc_75f3_firmwareepyc_7453_firmwareepyc_7343_firmwareepyc_74f3epyc_7413epyc_7313pepyc_73f33rd Gen AMD EPYC™
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-26314
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.10% / 27.61%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-17 Sep, 2024 | 02:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative execution with Floating-Point Value Injection

Potential floating point value injection in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution with incorrect floating point results, may cause the use of incorrect data from FPVI and may result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationFedora ProjectBroadcom Inc.Arm Limited
Product-core_i7-7700kryzen_5_5600xxeon_silver_4214fedoracore_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-29900
Matching Score-8
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-8
Assigner-Advanced Micro Devices Inc.
CVSS Score-6.5||MEDIUM
EPSS-1.45% / 79.97%
||
7 Day CHG~0.00%
Published-12 Jul, 2022 | 15:50
Updated-20 Nov, 2024 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.

Action-Not Available
Vendor-Debian GNU/LinuxFedora ProjectAdvanced Micro Devices, Inc.Xen Project
Product-epyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareathlon_x4_870k_firmwareathlon_silver_3050u_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7402epyc_7f32epyc_7551_firmwareepyc_7272_firmwareryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareathlon_x4_880k_firmwareryzen_7_4700geryzen_5_2500ua9-9410_firmwareathlon_x4_940_firmwareepyc_7702ryzen_threadripper_pro_5955wx_firmwarea9-9420_firmwareryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareathlon_x4_830_firmwareryzen_3_2300uryzen_5_3600x_firmwareepyc_7542ryzen_7_3750h_firmwareryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7h12_firmwareryzen_threadripper_3960x_firmwareryzen_threadripper_3960xryzen_threadripper_2950xryzen_5_2700_firmwareryzen_5_4500u_firmwareathlon_x4_760kepyc_7002epyc_7f52ryzen_threadripper_pro_5945wxryzen_5_2500u_firmwareepyc_7001ryzen_3_4300g_firmwareryzen_3_3100epyc_7f32_firmwaredebian_linuxepyc_7502ryzen_7_3750hepyc_7001_firmwareepyc_7662_firmwareepyc_7f72_firmwarea12-9730pryzen_3_2200u_firmwareathlon_x4_840_firmwareepyc_7281ryzen_3_2200uepyc_7551epyc_7551pepyc_7002_firmwareryzen_threadripper_2920xathlon_x4_970a10-9630pepyc_7551p_firmwareathlon_x4_950_firmwareryzen_7_3800xt_firmwareepyc_7601_firmwareryzen_5_2600ryzen_7_2700ryzen_7_2700x_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xepyc_7352ryzen_5_2600hathlon_x4_750ryzen_5_3500uepyc_7401epyc_7742ryzen_7_2700uepyc_7272ryzen_5_3450g_firmwarea10-9600pryzen_9_4900h_firmwareryzen_5_4600geryzen_7_2800hryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_3_4300uryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_5_2600x_firmwareryzen_7_3700x_firmwareryzen_threadripper_3990xryzen_7_2700_firmwareathlon_x4_835_firmwareryzen_5_3400g_firmwareepyc_7261_firmwareathlon_gold_3150uryzen_threadripper_pro_5955wxryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareepyc_7742_firmwareryzen_threadripper_pro_3795wxryzen_3_3300u_firmwareryzen_7_4700uryzen_7_3800xa6-9220c_firmwareepyc_7501_firmwarea12-9730p_firmwareryzen_5_4600uepyc_7501athlon_x4_970_firmwareepyc_7301_firmwareathlon_x4_870kryzen_5_3600_firmwareryzen_5_4600hryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_3_3200u_firmwareathlon_x4_750_firmwareathlon_x4_940ryzen_3_3300x_firmwareepyc_7402pepyc_7252_firmwarea4-9120_firmwareryzen_3_3300uepyc_7542_firmwarea6-9210ryzen_threadripper_pro_5945wx_firmwareryzen_3_3300g_firmwareryzen_5_3600xtryzen_5_3450gryzen_5_3550h_firmwareryzen_7_4800hepyc_7252epyc_7502pryzen_threadripper_pro_5975wxryzen_3_2300u_firmwarea12-9700pryzen_9_4900ha12-9700p_firmwareepyc_7351p_firmwarea9-9420fedoraepyc_7302p_firmwareathlon_x4_840ryzen_threadripper_2970wxepyc_7642_firmwareepyc_7452epyc_7h12ryzen_7_3700u_firmwarea6-9220_firmwareathlon_x4_860k_firmwareryzen_5_2600xryzen_7_2700u_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_3_4300gryzen_5_2700epyc_7601epyc_7302ryzen_7_3800x_firmwarea6-9220ryzen_7_2800h_firmwarea10-9600p_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_7_4700g_firmwareepyc_7552_firmwareryzen_5_3600xepyc_7371epyc_7f72epyc_7662a10-9630p_firmwareryzen_7_3800xtryzen_threadripper_pro_5975wx_firmwareryzen_threadripper_2970wx_firmwareepyc_7642epyc_7451_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7301ryzen_7_2700xepyc_7401p_firmwareepyc_7351pryzen_7_4700ge_firmwareryzen_threadripper_pro_3955wxryzen_3_3200uryzen_7_4700u_firmwareryzen_7_3700uepyc_7251epyc_7351_firmwareathlon_x4_830a6-9220cepyc_7302pepyc_7552athlon_silver_3050uathlon_x4_950ryzen_5_4600gepyc_7302_firmwareryzen_threadripper_pro_3955wx_firmwarea6-9210_firmwareathlon_x4_835athlon_x4_845_firmwarea9-9410epyc_7402_firmwareathlon_x4_760k_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareepyc_7262athlon_x4_845ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxxenryzen_3_3250uepyc_7251_firmwareepyc_7401_firmwareathlon_gold_3150u_firmwareathlon_x4_860ka4-9120epyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xepyc_7452_firmwareepyc_7351ryzen_3_3300gryzen_threadripper_pro_3945wxathlon_x4_880kryzen_threadripper_3970x_firmwareryzen_3_3250u_firmwareryzen_5_3500u_firmwareryzen_5_3600ryzen_5_4600ge_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareryzen_7_4800uepyc_7352_firmwareepyc_7702_firmwareepyc_7532AMD Processors
CWE ID-CWE-212
Improper Removal of Sensitive Information Before Storage or Transfer
CVE-2017-5925
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.82%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern Intel processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5926
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.82%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern AMD processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2017-5927
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.38% / 58.82%
||
7 Day CHG~0.00%
Published-27 Feb, 2017 | 07:25
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Page table walks conducted by the MMU during virtual to physical address translation leave a trace in the last level cache of modern ARM processors. By performing a side-channel attack on the MMU operations, it is possible to leak data and code pointers from JavaScript, breaking ASLR.

Action-Not Available
Vendor-allwinnern/aAdvanced Micro Devices, Inc.SamsungIntel CorporationNVIDIA Corporation
Product-e-350celeron_n2840a64phenom_9550_4-corecore_i7-6700kcore_i7-3632qmcore_i7_920athlon_ii_640_x4core_i7-4500uexynos_5800core_i7-2620qmtegra_k1_cd570m-a1xeon_e5-2658_v2atom_c2750fx-8320_8-corefx-8120_8-corefx-8350_8-corecore_i5_m480xeon_e3-1240_v5tegra_k1_cd580m-a1n/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-1170
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.04% / 11.33%
||
7 Day CHG~0.00%
Published-22 Jun, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/ipv4/netfilter/arp_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-1356
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.06% / 17.38%
||
7 Day CHG~0.00%
Published-19 Jul, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

IBM WebSphere Application Server (WAS) 6.1 before 6.1.0.39 and 7.0 before 7.0.0.19 allows local users to obtain sensitive stack-trace information via a crafted Administration Console request.

Action-Not Available
Vendor-n/aIBM Corporation
Product-websphere_application_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-39527
Matching Score-4
Assigner-Juniper Networks, Inc.
ShareView Details
Matching Score-4
Assigner-Juniper Networks, Inc.
CVSS Score-6.8||MEDIUM
EPSS-0.03% / 6.49%
||
7 Day CHG~0.00%
Published-11 Oct, 2024 | 15:17
Updated-15 Oct, 2024 | 12:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Junos OS: SRX Series: Low privileged user able to access sensitive information on file system

An Exposure of Sensitive Information to an Unauthorized Actor vulnerability in the command-line interface (CLI) of Juniper Networks Junos OS on SRX Series devices allows a local, low-privileged user with access to the Junos CLI to view the contents of protected files on the file system. Through the execution of crafted CLI commands, a user with limited permissions (e.g., a low privilege login class user) can access protected files that should not be accessible to the user. These files may contain sensitive information that can be used to cause further impact to the system. This issue affects Junos OS on SRX Series:  * All versions before 21.4R3-S8,  * 22.2 before 22.2R3-S5,  * 22.3 before 22.3R3-S4,  * 22.4 before 22.4R3-S4,  * 23.2 before 23.2R2-S2,  * 23.4 before 23.4R2.

Action-Not Available
Vendor-Juniper Networks, Inc.
Product-Junos OS
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-1172
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.04% / 11.65%
||
7 Day CHG~0.00%
Published-22 Jun, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/ipv6/netfilter/ip6_tables.c in the IPv6 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-0711
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.06% / 17.03%
||
7 Day CHG~0.00%
Published-01 Mar, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncRed Hat, Inc.
Product-linux_kernelenterprise_linux_server_eusenterprise_linux_workstationenterprise_linux_serverenterprise_linux_desktopenterprise_linux_server_ausn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-0636
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-2.1||LOW
EPSS-0.06% / 18.39%
||
7 Day CHG~0.00%
Published-22 Jan, 2011 | 21:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The (1) cudaHostAlloc and (2) cuMemHostAlloc functions in the NVIDIA CUDA Toolkit 3.2 developer drivers for Linux 260.19.26, and possibly other versions, do not initialize pinned memory, which allows local users to read potentially sensitive memory, such as file fragments during read or write operations.

Action-Not Available
Vendor-n/aNVIDIA Corporation
Product-cuda_toolkitn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-1171
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.04% / 11.33%
||
7 Day CHG~0.00%
Published-22 Jun, 2011 | 22:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

net/ipv4/netfilter/ip_tables.c in the IPv4 implementation in the Linux kernel before 2.6.39 does not place the expected '\0' character at the end of string data in the values of certain structure members, which allows local users to obtain potentially sensitive information from kernel memory by leveraging the CAP_NET_ADMIN capability to issue a crafted request, and then reading the argument to the resulting modprobe process.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-1160
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.17% / 39.17%
||
7 Day CHG~0.00%
Published-21 Jun, 2012 | 23:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The tpm_open function in drivers/char/tpm/tpm.c in the Linux kernel before 2.6.39 does not initialize a certain buffer, which allows local users to obtain potentially sensitive information from kernel memory via unspecified vectors.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-1162
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.12% / 31.54%
||
7 Day CHG~0.00%
Published-27 Jan, 2012 | 15:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The tpm_read function in the Linux kernel 2.6 does not properly clear memory, which might allow local users to read the results of the previous TPM command.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-0710
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.11% / 29.69%
||
7 Day CHG~0.00%
Published-18 Feb, 2011 | 19:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The task_show_regs function in arch/s390/kernel/traps.c in the Linux kernel before 2.6.38-rc4-next-20110216 on the s390 platform allows local users to obtain the values of the registers of an arbitrary process by reading a status file under /proc/.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kerneln/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-0178
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-2.1||LOW
EPSS-0.05% / 14.61%
||
7 Day CHG~0.00%
Published-23 Mar, 2011 | 01:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The FSFindFolder API in CarbonCore in Apple Mac OS X before 10.6.7 provides a world-readable directory in response to a call with the kTemporaryFolderType flag, which allows local users to obtain potentially sensitive information by accessing this directory.

Action-Not Available
Vendor-n/aApple Inc.
Product-carboncoremac_os_xmac_os_x_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-38041
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.5||MEDIUM
EPSS-19.11% / 95.11%
||
7 Day CHG~0.00%
Published-09 Jul, 2024 | 17:02
Updated-05 May, 2025 | 17:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Kernel Information Disclosure Vulnerability

Windows Kernel Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_10_1809windows_server_2016windows_server_2022_23h2windows_11_21h2windows_10_22h2windows_server_2022windows_11_22h2windows_server_2019windows_10_1607windows_11_23h2Windows Server 2022Windows 10 Version 21H2Windows 11 version 22H2Windows 11 Version 23H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2016 (Server Core installation)Windows 10 Version 1607Windows 10 Version 1809Windows Server 2016Windows Server 2019Windows 11 version 21H2Windows 10 Version 22H2Windows 11 version 22H3Windows Server 2019 (Server Core installation)
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-24001
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-3.8||LOW
EPSS-0.02% / 3.85%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 17:40
Updated-03 Aug, 2024 | 03:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information disclosure vulnerability in Edge Panel prior to Android S(12) allows physical attackers to access screenshot in clipboard via Edge Panel.

Action-Not Available
Vendor-Google LLCSamsung Electronics
Product-androidSamsung Mobile Devices
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2011-0197
Matching Score-4
Assigner-Apple Inc.
ShareView Details
Matching Score-4
Assigner-Apple Inc.
CVSS Score-2.1||LOW
EPSS-0.05% / 13.38%
||
7 Day CHG~0.00%
Published-24 Jun, 2011 | 20:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

App Store in Apple Mac OS X before 10.6.8 creates a log entry containing a user's AppleID password, which might allow local users to obtain sensitive information by reading a log file, as demonstrated by a log file that has non-default permissions.

Action-Not Available
Vendor-n/aApple Inc.
Product-mac_os_xmac_os_x_servern/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2024-42508
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
ShareView Details
Matching Score-4
Assigner-Hewlett Packard Enterprise (HPE)
CVSS Score-5.5||MEDIUM
EPSS-0.03% / 7.17%
||
7 Day CHG~0.00%
Published-18 Oct, 2024 | 15:10
Updated-17 Mar, 2025 | 22:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users.

Action-Not Available
Vendor-HP Inc.Hewlett Packard Enterprise (HPE)
Product-oneviewHPE OneView
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-4158
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.34% / 56.38%
||
7 Day CHG~0.00%
Published-30 Dec, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The sk_run_filter function in net/core/filter.c in the Linux kernel before 2.6.36.2 does not check whether a certain memory location has been initialized before executing a (1) BPF_S_LD_MEM or (2) BPF_S_LDX_MEM instruction, which allows local users to obtain potentially sensitive information from kernel stack memory via a crafted socket filter.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncFedora ProjectopenSUSE
Product-linux_kernelfedoraopensuselinux_enterprise_software_development_kitlinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2010-3861
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-2.1||LOW
EPSS-0.05% / 15.79%
||
7 Day CHG~0.00%
Published-10 Dec, 2010 | 18:00
Updated-11 Apr, 2025 | 00:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The ethtool_get_rxnfc function in net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize a certain block of heap memory, which allows local users to obtain potentially sensitive information via an ETHTOOL_GRXCLSRLALL ethtool command with a large info.rule_cnt value, a different vulnerability than CVE-2010-2478.

Action-Not Available
Vendor-n/aSUSELinux Kernel Organization, IncCanonical Ltd.openSUSE
Product-linux_kernelubuntu_linuxopensuselinux_enterprise_serverlinux_enterprise_real_time_extensionlinux_enterprise_desktopn/a
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2022-22287
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-3.9||LOW
EPSS-0.07% / 20.55%
||
7 Day CHG~0.00%
Published-07 Jan, 2022 | 22:39
Updated-03 Aug, 2024 | 03:07
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Abitrary file access vulnerability in Samsung Email prior to 6.1.60.16 allows attacker to read isolated data in sandbox.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-samsung_emailSamsung Email
CWE ID-CWE-20
Improper Input Validation
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 21
  • 22
  • Next
Details not found