Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-1998

Summary
Assigner-Google
Assigner Org ID-14ed7db2-1595-443d-9d34-6215bf890778
Published At-21 Apr, 2023 | 14:51
Updated At-13 Feb, 2025 | 16:39
Rejected At-
Credits

Spectre v2 SMT mitigations problem in Linux kernel

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:Google
Assigner Org ID:14ed7db2-1595-443d-9d34-6215bf890778
Published At:21 Apr, 2023 | 14:51
Updated At:13 Feb, 2025 | 16:39
Rejected At:
▼CVE Numbering Authority (CNA)
Spectre v2 SMT mitigations problem in Linux kernel

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

Affected Products
Vendor
Linux Kernel Organization, IncLinux
Product
Linux Kernel
Collection URL
https://git.kernel.org/
Package Name
kernel
Repo
https://git.kernel.org/
Modules
  • x86/speculation
Platforms
  • Linux
Default Status
unaffected
Versions
Affected
  • From 0 before 6.3 (custom)
Problem Types
TypeCWE IDDescription
CWECWE-1303CWE-1303 Non-Transparent Sharing of Microarchitectural Resources
Type: CWE
CWE ID: CWE-1303
Description: CWE-1303 Non-Transparent Sharing of Microarchitectural Resources
Metrics
VersionBase scoreBase severityVector
3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
CAPEC-663CAPEC-663 Exploitation of Transient Instruction Execution
CAPEC ID: CAPEC-663
Description: CAPEC-663 Exploitation of Transient Instruction Execution
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
N/A
https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
N/A
https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
N/A
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
N/A
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
N/A
Hyperlink: https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
Resource: N/A
Hyperlink: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Resource: N/A
Hyperlink: https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
Resource: N/A
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Resource: N/A
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
x_transferred
https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
x_transferred
https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
x_transferred
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
x_transferred
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
x_transferred
Hyperlink: https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
Resource:
x_transferred
Hyperlink: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Resource:
x_transferred
Hyperlink: https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
Resource:
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Resource:
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve-coordination@google.com
Published At:21 Apr, 2023 | 15:15
Updated At:13 Feb, 2025 | 17:16

The Linux kernel allows userspace processes to enable mitigations by calling prctl with PR_SET_SPECULATION_CTRL which disables the speculation feature as well as by using seccomp. We had noticed that on VMs of at least one major cloud provider, the kernel still left the victim process exposed to attacks in some cases even after enabling the spectre-BTI mitigation with prctl. The same behavior can be observed on a bare-metal machine when forcing the mitigation to IBRS on boot command line. This happened because when plain IBRS was enabled (not enhanced IBRS), the kernel had some logic that determined that STIBP was not needed. The IBRS bit implicitly protects against cross-thread branch target injection. However, with legacy IBRS, the IBRS bit was cleared on returning to userspace, due to performance reasons, which disabled the implicit STIBP and left userspace threads vulnerable to cross-thread branch target injection against which STIBP protects.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Primary3.15.6MEDIUM
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 5.6
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CPE Matches

Linux Kernel Organization, Inc
linux
>>linux_kernel>>Versions before 6.3(exclusive)
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
Debian GNU/Linux
debian
>>debian_linux>>10.0
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-1303Secondarycve-coordination@google.com
CWE-203Primarynvd@nist.gov
CWE ID: CWE-1303
Type: Secondary
Source: cve-coordination@google.com
CWE ID: CWE-203
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crxcve-coordination@google.com
Exploit
Third Party Advisory
https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9dcve-coordination@google.com
Patch
https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9dcve-coordination@google.com
Not Applicable
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.htmlcve-coordination@google.com
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.htmlcve-coordination@google.com
Mailing List
Third Party Advisory
https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crxaf854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9daf854a3a-2127-422b-91ae-364da2661108
Patch
https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9daf854a3a-2127-422b-91ae-364da2661108
Not Applicable
https://lists.debian.org/debian-lts-announce/2023/05/msg00005.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
https://lists.debian.org/debian-lts-announce/2023/05/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Third Party Advisory
Hyperlink: https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
Source: cve-coordination@google.com
Resource:
Exploit
Third Party Advisory
Hyperlink: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Source: cve-coordination@google.com
Resource:
Patch
Hyperlink: https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Source: cve-coordination@google.com
Resource:
Not Applicable
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
Source: cve-coordination@google.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Source: cve-coordination@google.com
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://github.com/google/security-research/security/advisories/GHSA-mj4w-6495-6crx
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
Hyperlink: https://github.com/torvalds/linux/commit/6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Hyperlink: https://kernel.dance/#6921ed9049bc7457f66c1596c5b78aec0dae4a9d
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Not Applicable
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00005.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2023/05/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Third Party Advisory

Change History

0
Information is not available yet

Similar CVEs

76Records found

CVE-2015-0837
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-5.9||MEDIUM
EPSS-0.55% / 66.98%
||
7 Day CHG~0.00%
Published-29 Nov, 2019 | 21:10
Updated-06 Aug, 2024 | 04:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The mpi_powm function in Libgcrypt before 1.6.3 and GnuPG before 1.4.19 allows attackers to obtain sensitive information by leveraging timing differences when accessing a pre-computed table during modular exponentiation, related to a "Last-Level Cache Side-Channel Attack."

Action-Not Available
Vendor-gnupgDebian GNU/LinuxGNU
Product-gnupglibgcryptdebian_linuxLibgcryptGnuPG
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-27170
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.05% / 14.84%
||
7 Day CHG~0.00%
Published-20 Mar, 2021 | 21:30
Updated-04 Aug, 2024 | 16:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the Linux kernel before 5.11.8. kernel/bpf/verifier.c performs undesirable out-of-bounds speculation on pointer arithmetic, leading to side-channel attacks that defeat Spectre mitigations and obtain sensitive information from kernel memory, aka CID-f232326f6966. This affects pointer types that do not define a ptr_limit.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/LinuxCanonical Ltd.
Product-ubuntu_linuxdebian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-21181
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-1.36% / 79.35%
||
7 Day CHG~0.00%
Published-09 Mar, 2021 | 17:46
Updated-03 Aug, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Side-channel information leakage in autofill in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.

Action-Not Available
Vendor-Fedora ProjectGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxfedoraChrome
CWE ID-CWE-203
Observable Discrepancy
CVE-2018-0495
Matching Score-6
Assigner-Debian GNU/Linux
ShareView Details
Matching Score-6
Assigner-Debian GNU/Linux
CVSS Score-4.7||MEDIUM
EPSS-0.31% / 53.85%
||
7 Day CHG~0.00%
Published-13 Jun, 2018 | 23:00
Updated-05 Aug, 2024 | 03:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.

Action-Not Available
Vendor-gnupgn/aOracle CorporationRed Hat, Inc.Canonical Ltd.Debian GNU/Linux
Product-enterprise_linux_serverubuntu_linuxdebian_linuxlibgcryptenterprise_linux_workstationtraffic_directorenterprise_linux_desktopansible_towerLibgcrypt before 1.7.10 and 1.8.x before 1.8.3
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-24512
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-3.3||LOW
EPSS-0.05% / 13.72%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 18:53
Updated-04 Aug, 2024 | 15:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable timing discrepancy in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationNetApp, Inc.Debian GNU/Linux
Product-solidfire_biosdebian_linuxfas\/aff_bioshci_compute_node_biosmicrocodeIntel(R) Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-16150
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 26.91%
||
7 Day CHG-0.01%
Published-02 Sep, 2020 | 00:00
Updated-04 Aug, 2024 | 13:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A Lucky 13 timing side channel in mbedtls_ssl_decrypt_buf in library/ssl_msg.c in Trusted Firmware Mbed TLS through 2.23.0 allows an attacker to recover secret key information. This affects CBC mode because of a computed time difference based on a padding length.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-3640
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-7||HIGH
EPSS-0.14% / 34.72%
||
7 Day CHG~0.00%
Published-24 Jul, 2023 | 15:19
Updated-23 Jul, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Kernel: x86/mm: a per-cpu entry area leak was identified through the init_cea_offsets function when prefetchnta and prefetcht2 instructions being used for the per-cpu entry area mapping to the user space

A possible unauthorized memory access flaw was found in the Linux kernel's cpu_entry_area mapping of X86 CPU data to memory, where a user may guess the location of exception stacks or other important data. Based on the previous CVE-2023-0597, the 'Randomize per-cpu entry area' feature was implemented in /arch/x86/mm/cpu_entry_area.c, which works through the init_cea_offsets() function when KASLR is enabled. However, despite this feature, there is still a risk of per-cpu entry area leaks. This issue could allow a local user to gain access to some important data with memory in an expected location and potentially escalate their privileges on the system.

Action-Not Available
Vendor-Red Hat, Inc.Linux Kernel Organization, Inc
Product-enterprise_linuxlinux_kernelRed Hat Enterprise Linux 7Red Hat Enterprise Linux 6Red Hat Enterprise Linux 8Red Hat Enterprise Linux 9
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-33850
Matching Score-6
Assigner-IBM Corporation
ShareView Details
Matching Score-6
Assigner-IBM Corporation
CVSS Score-7.5||HIGH
EPSS-0.03% / 7.66%
||
7 Day CHG~0.00%
Published-22 Aug, 2023 | 20:31
Updated-03 Oct, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM GSKit-Crypto information disclosure

IBM GSKit-Crypto could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information.

Action-Not Available
Vendor-Microsoft CorporationHP Inc.IBM CorporationLinux Kernel Organization, Inc
Product-linux_kerneltxseries_for_multiplatformcics_txhp-uxwindowsaixCICS TX AdvancedCICS TX StandardTXSeries for Multiplatformstxseries_for_multiplatformcics_tx
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-12402
Matching Score-6
Assigner-Mozilla Corporation
ShareView Details
Matching Score-6
Assigner-Mozilla Corporation
CVSS Score-4.4||MEDIUM
EPSS-0.03% / 5.29%
||
7 Day CHG~0.00%
Published-09 Jul, 2020 | 14:53
Updated-04 Aug, 2024 | 11:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox < 78.

Action-Not Available
Vendor-Debian GNU/LinuxopenSUSEFedora ProjectMozilla Corporation
Product-firefoxdebian_linuxfedoraleapFirefox
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-10932
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-4.7||MEDIUM
EPSS-0.03% / 5.70%
||
7 Day CHG~0.00%
Published-15 Apr, 2020 | 00:00
Updated-04 Aug, 2024 | 11:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Arm Mbed TLS before 2.16.6 and 2.7.x before 2.7.15. An attacker that can get precise enough side-channel measurements can recover the long-term ECDSA private key by (1) reconstructing the projective coordinate of the result of scalar multiplication by exploiting side channels in the conversion to affine coordinates; (2) using an attack described by Naccache, Smart, and Stern in 2003 to recover a few bits of the ephemeral scalar from those projective coordinates via several measurements; and (3) using a lattice attack to get from there to the long-term ECDSA private key used for the signatures. Typically an attacker would have sufficient access when attacking an SGX enclave and controlling the untrusted OS.

Action-Not Available
Vendor-n/aDebian GNU/LinuxFedora ProjectArm Limited
Product-mbed_tlsdebian_linuxfedoran/a
CWE ID-CWE-327
Use of a Broken or Risky Cryptographic Algorithm
CWE ID-CWE-203
Observable Discrepancy
CVE-2023-20569
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-4.7||MEDIUM
EPSS-0.65% / 69.92%
||
7 Day CHG~0.00%
Published-08 Aug, 2023 | 17:02
Updated-23 Sep, 2024 | 03:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A side channel vulnerability on some of the AMD CPUs may allow an attacker to influence the return address prediction. This may result in speculative execution at an attacker-controlled address, potentially leading to information disclosure.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.Microsoft CorporationFedora ProjectDebian GNU/Linux
Product-ryzen_9_5900xepyc_7543epyc_9354pryzen_5_7645hxryzen_9_pro_7640hs_firmwareepyc_7713pepyc_7443epyc_7513ryzen_9_5900x_firmwareryzen_9_6900hx_firmwareryzen_9_5980hxryzen_7_pro_7730uryzen_7_7745hx_firmwareryzen_5_5600hsryzen_3_5300geepyc_7453ryzen_7_5825uryzen_7_5825u_firmwareepyc_9334_firmwareepyc_9454p_firmwareepyc_9454epyc_7413_firmwareepyc_9534_firmwareepyc_9754_firmwareryzen_7_5800x3d_firmwareepyc_7643_firmwareryzen_9_7950xepyc_9274f_firmwareryzen_threadripper_pro_5945wxryzen_5_7540uepyc_7373x_firmwareepyc_75f3_firmwareepyc_7473x_firmwareryzen_7_7700xepyc_9634_firmwarewindows_11_22h2ryzen_7_7700x_firmwareryzen_7_5700gryzen_9_7845hx_firmwareryzen_9_6900hxepyc_7573x_firmwareryzen_9_7945hx_firmwareryzen_5_7640hryzen_5_5500ryzen_3_5400uepyc_7713ryzen_5_5600_firmwareryzen_9_pro_5945windows_10_1607ryzen_5_7640h_firmwareryzen_5_7540u_firmwareryzen_5_5600x_firmwareryzen_9_5980hs_firmwareryzen_7_5800x3dryzen_7_7735uryzen_7_6800h_firmwareryzen_9_pro_7945ryzen_5_5600ge_firmwareepyc_9634epyc_9554p_firmwareryzen_5_5600h_firmwareryzen_7_5700ryzen_7_7745hxryzen_7_5800ryzen_7_pro_7745_firmwareryzen_5_7535uryzen_9_5950xryzen_9_7900x3d_firmwareryzen_5_5500_firmwareryzen_7_7840h_firmwareryzen_9_7845hxepyc_7443_firmwareryzen_7_6800hsepyc_7343epyc_7543_firmwarewindows_11_21h2ryzen_7_7736uepyc_9274fryzen_threadripper_pro_5945wx_firmwareepyc_9734epyc_9454pepyc_9734_firmwareepyc_7313p_firmwareryzen_5_5600uepyc_9124fedoraryzen_5_5600x3d_firmwareryzen_5_5600geryzen_7_7840u_firmwareepyc_9374f_firmwareryzen_9_6980hs_firmwareryzen_9_5900hs_firmwareepyc_72f3_firmwareepyc_9174fryzen_threadripper_pro_5975wx_firmwareryzen_7_5700_firmwareepyc_7413ryzen_9_7945hx3dryzen_5_7535hsepyc_9654_firmwareepyc_9384xryzen_9_7940h_firmwareepyc_7313ryzen_7_5700x_firmwarewindows_10_1507epyc_7663_firmwareryzen_3_7440u_firmwareryzen_3_pro_7330u_firmwareryzen_5_pro_5645_firmwareepyc_74f3_firmwareepyc_9654pryzen_3_5425uepyc_7763epyc_9454_firmwareryzen_7_5800_firmwareepyc_9374fryzen_9_5980hx_firmwareryzen_3_5100_firmwareepyc_7713p_firmwareryzen_3_7440uryzen_5_7645hx_firmwareepyc_9334ryzen_7_5800uryzen_9_7950x3d_firmwareryzen_5_5600g_firmwareryzen_5_pro_7645ryzen_5_5600ryzen_7_5800hepyc_7543pryzen_7_pro_7730u_firmwarewindows_10_1809ryzen_9_7950x_firmwareepyc_7453_firmwareryzen_7_5700uryzen_7_pro_7840hs_firmwareryzen_7_5700ge_firmwareepyc_9554windows_server_2019ryzen_7_6800hryzen_9_7900x_firmwareryzen_5_6600h_firmwareepyc_9254_firmwareryzen_5_pro_5645ryzen_7_7800x3d_firmwareryzen_7_7840uryzen_5_pro_7640hs_firmwareryzen_7_7735hs_firmwareepyc_7573xepyc_9684x_firmwarewindows_10_21h2epyc_9534ryzen_3_pro_7330uryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareryzen_5_5600xryzen_9_5900_firmwareryzen_threadripper_pro_5995wxepyc_7373xwindows_10_22h2epyc_7513_firmwareryzen_5_6600hryzen_9_pro_7640hsepyc_9384x_firmwareryzen_9_6980hxryzen_5_5560uryzen_9_7940hepyc_75f3debian_linuxepyc_9184x_firmwareryzen_7_5700u_firmwareryzen_9_7900xepyc_7343_firmwareryzen_5_6600hsepyc_9754s_firmwareryzen_7_pro_5845ryzen_7_7840hryzen_9_5900hsryzen_5_7640uwindows_server_2022epyc_9174f_firmwareepyc_7313pwindows_server_2008epyc_9124_firmwareryzen_9_7945hx3d_firmwareryzen_9_5980hsryzen_3_5125c_firmwareryzen_5_7600ryzen_5_5500u_firmwareryzen_7_5800h_firmwareryzen_9_6900hsryzen_threadripper_pro_5965wx_firmwareepyc_7713_firmwareepyc_9254epyc_9474f_firmwareepyc_7443p_firmwareryzen_7_5800xepyc_7773xryzen_7_7700_firmwareryzen_3_5300gryzen_5_7600x_firmwareryzen_9_5900ryzen_7_6800u_firmwareryzen_5_pro_7530uryzen_5_5600hs_firmwareryzen_7_pro_7745ryzen_threadripper_pro_5955wxryzen_9_6900hs_firmwareryzen_5_5500uryzen_3_5400u_firmwareryzen_7_6800hs_firmwareryzen_7_7800x3dryzen_5_pro_7640hsryzen_5_5600hryzen_5_7535u_firmwareryzen_3_5300u_firmwareryzen_7_6800uryzen_9_7945hxepyc_7763_firmwareryzen_3_5300uryzen_5_5600gryzen_9_pro_7945_firmwareryzen_3_5425u_firmwareryzen_7_7735hsryzen_9_7900x3dryzen_threadripper_pro_5975wxryzen_9_5900hx_firmwareepyc_9354ryzen_9_5950x_firmwareryzen_9_7900_firmwareryzen_5_7600xryzen_7_5800x_firmwareepyc_7543p_firmwareryzen_3_5300ge_firmwareryzen_5_5625uryzen_5_6600uryzen_7_5700geepyc_9554_firmwareryzen_3_5125cryzen_9_6980hx_firmwareryzen_7_7735u_firmwareryzen_7_pro_5845_firmwareryzen_5_5600u_firmwareepyc_7663ryzen_5_5600x3depyc_7773x_firmwareryzen_5_pro_7645_firmwareryzen_5_6600u_firmwareryzen_3_7335uryzen_7_5700g_firmwareryzen_5_7535hs_firmwareryzen_5_7600_firmwareepyc_7473xepyc_9754ryzen_7_pro_7840hsryzen_5_7500f_firmwareryzen_9_pro_5945_firmwareepyc_9554pepyc_9654windows_server_2016epyc_9684xwindows_server_2012ryzen_3_5300g_firmwareryzen_5_7500fryzen_7_5800u_firmwareryzen_7_7736u_firmwareepyc_9474fryzen_5_6600hs_firmwareepyc_9754sryzen_5_7640u_firmwareryzen_5_5560u_firmwareepyc_73f3_firmwareepyc_9654p_firmwareryzen_threadripper_pro_5965wxryzen_9_5900hxepyc_72f3epyc_7643ryzen_9_7950x3depyc_9354_firmwareryzen_7_7700ryzen_3_5100epyc_9354p_firmwareepyc_9224_firmwareepyc_7313_firmwareepyc_7443pryzen_9_7900epyc_9184xryzen_5_pro_7530u_firmwareryzen_7_5800hs_firmwareepyc_9224ryzen_threadripper_pro_5995wx_firmwareryzen_5_5625u_firmwareryzen_3_7335u_firmwareepyc_74f3ryzen_7_5700xryzen_9_6980hsepyc_73f3Ryzen™ PRO 3000 Series Desktop Processors Ryzen™ Threadripper™ 5000 Series ProcessorsAthlon™ 3000 Series Mobile Processors with Radeon™ GraphicsRyzen™ Threadripper™ 2000 Series Processors Ryzen™ 4000 Series Desktop Processors with Radeon™ Graphics4th Gen AMD EPYC™ Processors2nd Gen AMD EPYC™ ProcessorsRyzen™ PRO 5000 Series Desktop ProcessorsRyzen™ 3000 Series Desktop ProcessorsRyzen™ PRO 3000 Series Processors with Radeon™ Vega GraphicsAthlon™ 3000 Series Processors with Radeon™ Graphics Ryzen™ PRO 5000 Series ProcessorsRyzen™ 3000 Series Desktop Processors with Radeon™ GraphicsRyzen™ PRO 6000 Series ProcessorsRyzen™ 5000 Series Desktop Processors with Radeon™ Graphics3rd Gen AMD EPYC™ ProcessorsRyzen™ 7000 Series Processors 1st Gen AMD EPYC™ ProcessorsRyzen™ PRO 4000 Series Desktop ProcessorsRyzen™ Threadripper™ 3000 Series ProcessorsAthlon™ PRO 3000 Series Processors with Radeon™ Vega GraphicsRyzen™ 5000 Series Processors with Radeon™ GraphicsRyzen™ 7040 Series Processors with Radeon™ GraphicsRyzen™ 6000 Series Processors with Radeon™ GraphicsRyzen™ 7000 Series Processors with Radeon™ GraphicsRyzen™ 5000 Series Desktop Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2019-9495
Matching Score-6
Assigner-CERT/CC
ShareView Details
Matching Score-6
Assigner-CERT/CC
CVSS Score-3.7||LOW
EPSS-2.48% / 84.69%
||
7 Day CHG-0.75%
Published-17 Apr, 2019 | 13:31
Updated-04 Aug, 2024 | 21:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns

The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.

Action-Not Available
Vendor-w1.fiWi-Fi AllianceDebian GNU/LinuxopenSUSEFreeBSD FoundationFedora ProjectSynology, Inc.
Product-freebsddebian_linuxradius_serverfedorahostapdbackports_slewpa_supplicantrouter_managerleaphostapd with EAP-pwd supportwpa_supplicant with EAP-pwd support
CWE ID-CWE-524
Use of Cache Containing Sensitive Information
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-48730
Matching Score-6
Assigner-kernel.org
ShareView Details
Matching Score-6
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.02% / 2.35%
||
7 Day CHG~0.00%
Published-20 Jun, 2024 | 11:13
Updated-04 May, 2025 | 08:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
dma-buf: heaps: Fix potential spectre v1 gadget

In the Linux kernel, the following vulnerability has been resolved: dma-buf: heaps: Fix potential spectre v1 gadget It appears like nr could be a Spectre v1 gadget as it's supplied by a user and used as an array index. Prevent the contents of kernel memory from being leaked to userspace via speculative execution by using array_index_nospec. [sumits: added fixes and cc: stable tags]

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-4543
Matching Score-6
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-6
Assigner-Red Hat, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.13% / 33.40%
||
7 Day CHG~0.00%
Published-11 Jan, 2023 | 00:00
Updated-08 Apr, 2025 | 19:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw named "EntryBleed" was found in the Linux Kernel Page Table Isolation (KPTI). This issue could allow a local attacker to leak KASLR base via prefetch side-channels based on TLB timing for Intel systems.

Action-Not Available
Vendor-n/aLinux Kernel Organization, Inc
Product-linux_kernelLinux kernel
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-203
Observable Discrepancy
CVE-2022-40982
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.42% / 61.03%
||
7 Day CHG+0.03%
Published-11 Aug, 2023 | 02:37
Updated-13 Feb, 2025 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aRed Hat, Inc.Xen ProjectNetApp, Inc.Intel CorporationDebian GNU/Linux
Product-xeon_d-2796texeon_w-1350_firmwarecore_i7-11850he_firmwarecore_i5-1035g7core_i3-8350k_firmwarecore_i3-9350k_firmwareceleron_5305ucore_i9-9990xe_firmwarepentium_gold_g6600_firmwarexeon_e-2314xeon_w-2125core_i9-10940xpentium_gold_g6400t_firmwarexeon_gold_5217_firmwarecore_i5-11600_firmwarexeon_d-2163it_firmwarecore_i7-1060g7_firmwarecore_i7-9700xeon_gold_6240_firmwarexeon_gold_6234core_i9-9900kfxeon_w-1250p_firmwarepentium_gold_g5400txeon_gold_6238rcore_i5-1035g4xeon_w-2255core_i5-10400hcore_i7-10700k_firmwarexeon_w-11555mlecore_i5-9600t_firmwarecore_i9-9940x_firmwarecore_i3-10100yxeon_gold_6248_firmwarecore_i5-10400tcore_i7-11370hcore_i5-10310ucore_i9-7920xcore_i7-7600ucore_i5-9400f_firmwarexeon_e-2224core_i7-10700t_firmwarexeon_gold_5218core_i3-7100ecore_i5-11600tcore_i9-7940x_firmwarecore_i5-8269u_firmwarexeon_e3-1505l_v6xeon_e-2278gexeon_platinum_8380hxeon_gold_5220r_firmwarexeon_d-2173it_firmwarexeon_w-2245pentium_6405u_firmwarexeon_d-1746tercore_i3-7120t_firmwarecore_i5-10400all_flash_fabric-attached_storage_8700pentium_gold_g6605_firmwareceleron_g5920core_i7-10710u_firmwarecore_i9-9940xcore_i5-11600xeon_gold_6240celeron_5305u_firmwareall_flash_fabric-attached_storage_9500pentium_gold_g6405t_firmwarecore_i5-8600core_i5-9400_firmwarexeon_d-2177nt_firmwareceleron_5205ucore_i7-8500y_firmwarecore_i7-7740x_firmwarecore_i7-1060g7xeon_gold_5220s_firmwarecore_i9-10900core_i5-11600k_firmwarexeon_e-2374g_firmwareceleron_g4900tcore_i3-10100txeon_w-1390t_firmwarexeon_gold_5220rxeon_d-2733nt_firmwarecore_i9-10900kxeon_e-2386gcore_i3-10325_firmwarexeon_d-2146ntxeon_gold_6230_firmwarecore_i5-8600kcore_i9-10900fcore_i7-8700k_firmwarecore_i5-11500t_firmwarexeon_w-2223_firmwarecore_i7-8750hcore_i3-10105t_firmwarecore_i9-9960x_firmwarexeon_e-2226ge_firmwarecore_i3-7100u_firmwarecore_i5-10400_firmwarecore_i3-1115gre_firmwarexeon_d-2166ntxeon_e3-1270_v6xeon_d-1732te_firmwarecore_i7-1180g7_firmwarecore_i3-1125g4xeon_gold_6328h_firmwarexeon_silver_4216xeon_gold_6230xeon_w-2195core_i7-7820eq_firmwarexeon_e-2276gxeon_w-1290p_firmwarecore_i3-1000g4xeon_gold_5317core_i5-7267u_firmwarexeon_d-2183itxeon_gold_6348h_firmwarecore_i3-7100core_i7-8809gxeon_gold_6246r_firmwarecore_i5-10400h_firmwarexeon_e3-1230_v6_firmwarecore_i5-10500_firmwarepentium_gold_g6505core_i5-7267uceleron_g5900t_firmwarexeon_gold_5320txeon_silver_4208core_i5-9400txeon_w-2123xeon_gold_5220score_i5-8300hxeon_platinum_9282core_i5-8600t_firmwarexeon_e3-1220_v6_firmwarecore_i3-10110ycore_i5-10600kfxeon_platinum_9242_firmwarexeon_e3-1535m_v6_firmwarexeon_gold_6240r_firmwarexeon_silver_4210xeon_platinum_8256_firmwarecore_i5-11600kfcore_i7-9800xcore_i7-11700kfpentium_gold_g5500tcore_i7-10870hxeon_w-11555mre_firmwarecore_i5-8600_firmwarexeon_silver_4215r_firmwarecore_i5-9600kf_firmwarexeon_silver_4310_firmwareceleron_g4920xeon_e-2274gcore_i5-11500tcore_i5-9500xeon_e-2278gelcore_i7-7740xxeon_silver_4310tcore_i5-1130g7_firmwarexeon_e3-1280_v6_firmwarexeon_gold_6230t_firmwaredebian_linuxcore_i5-8300h_firmwarexeon_silver_4208_firmwarexeon_platinum_8268xeon_e-2136_firmwareall_flash_fabric-attached_storage_c400core_i7-8565ucore_i9-9980xe_firmwarexeon_e-2274g_firmwarecore_i3-10300_firmwarecore_i7-7560ucore_i9-11900fcore_i5-8259ucore_i3-8100t_firmwareceleron_g5900txeon_w-1250_firmwarecore_i7-11600hpentium_gold_g5500xeon_w-3265m_firmwarexeon_w-11555mle_firmwarecore_i7-8850h_firmwarexeon_e-2336core_i7-9700kf_firmwarecore_i9-7900x_firmwarecore_i3-10105pentium_gold_g6405_firmwarexeon_gold_5218_firmwarecore_i5-7600tpentium_gold_g6500_firmwarecore_i9-10900k_firmwarexeon_w-1270_firmwarexeon_e-2224gxeon_w-2135xeon_silver_4316_firmwarecore_i7-1185g7_firmwarecore_i5-11320hxeon_e-2226gecore_i3-10300t_firmwarepentium_6405upentium_gold_g6500core_i3-7167u_firmwarecore_i7-8559u_firmwarexeon_gold_5220t_firmwarecore_i9-10920x_firmwarecore_i7-8086k_firmwarecore_i7-10610uxeon_gold_5220_firmwarecore_i5-1035g1_firmwarecore_i7-8665u_firmwareall_flash_fabric-attached_storage_c250core_i7-8500ycore_i9-9900txeon_gold_6208u_firmwarecore_i3-7310t_firmwarexeon_platinum_8360hxeon_w-1390pxeon_gold_6250_firmwarecore_i5-11300h_firmwarecore_i3-8300t_firmwarecore_i5-7400_firmwarecore_i3-8109u_firmwarexeon_gold_6254_firmwarecore_i7-9700k_firmwarecore_i9-10980xe_firmwarexeon_e-2288g_firmwarexeon_silver_4310core_i5-1145g7e_firmwarexeon_gold_6258r_firmwarecore_i3-10300txeon_silver_4314_firmwarecore_i3-7101ecore_i3-8100b_firmwarecore_i9-7900xcore_i9-8950hk_firmwarexeon_gold_6209uxeon_w-3223pentium_gold_g6600xeon_w-2235_firmwarecore_i5-8265uxeon_platinum_8376h_firmwarepentium_gold_g6605celeron_g5925pentium_gold_g5400t_firmwarexeon_e-2286g_firmwarexeon_d-2183it_firmwarecore_i3-8350kcore_i7-10700_firmwarecore_i5-7500txeon_e3-1505m_v6core_i3-9100core_i5-9600k_firmwarexeon_platinum_9282_firmwarexeon_e-2224g_firmwarepentium_gold_g5600xeon_gold_5220tcore_i5-1145gre_firmwarexeon_platinum_8276lcore_i7-7700kcore_i7-8705gxeon_platinum_9222xeon_gold_6230tcore_i7-7660ucore_i7-8706gxeon_w-3225xeon_w-1370core_i7-8700t_firmwarecore_i7-1185grecore_i7-11375hxeon_e3-1240_v6core_i7-8700core_i5-10400fcore_i5-8259u_firmwarexeon_w-2155_firmwarecore_i7-1068g7xeon_platinum_8380h_firmwarecore_i7-8705g_firmwarexeon_d-1746ter_firmwarecore_i3-7100tcore_i7-7700tcore_i7-10700txeon_w-3225_firmwarecore_i5-10210uxeon_w-2295core_i5-7260u_firmwarecore_i5-7600k_firmwarecore_i5-8257ucore_i7-8700kpentium_gold_g6405tcore_i5-1155g7_firmwarexeon_silver_4316xeon_e3-1270_v6_firmwarecore_i5-7442eqcore_i7-10510u_firmwarexeon_gold_5215xeon_d-2143itxeon_e-2226g_firmwarecore_i3-10100_firmwarexeon_gold_6244_firmwarexeon_e3-1285_v6core_i5-10505xeon_d-2161i_firmwarecore_i5-1030g7xeon_e3-1225_v6core_i5-7442eq_firmwarecore_i7-8569u_firmwarexeon_e-2144g_firmwarexeon_bronze_3206r_firmwarexeon_silver_4215rcore_i7-1185g7e_firmwarecore_i3-10110ucore_i5-10600kf_firmwarecore_i7-11800hxeon_gold_6330xeon_silver_4210txeon_gold_6212u_firmwarecore_i5-10310u_firmwarexeon_gold_6212uxeon_silver_4310t_firmwarecore_i9-7980xexeon_gold_6240l_firmwarexeon_d-2123it_firmwareceleron_g4900t_firmwarecore_i3-10105fcore_i3-8100hcore_i3-7310tcore_i9-11950hxeon_e-2386g_firmwarecore_i5-10300hxeon_gold_6238lxeon_platinum_8353hxeon_w-11865mlecore_i3-1005g1_firmwarecore_i5-7300uxeon_e3-1505l_v6_firmwarecore_i5-8500txeon_w-3265mcore_i5-7500xeon_gold_5320hxeon_platinum_8260y_firmwarepentium_gold_g6500tcore_i5-11500h_firmwarecore_i9-11900kcore_i5-8350u_firmwarexeon_d-2796te_firmwarexeon_gold_6338txeon_gold_6240y_firmwarecore_i9-10850kpentium_gold_g5600_firmwareceleron_g5905_firmwarexeon_e-2314_firmwarecore_i9-9900ks_firmwarepentium_gold_g6400tcore_i5-8400tcore_i3-9300_firmwarexeon_d-2145nt_firmwarexeon_w-1270pcore_i7-10700core_i7-11600h_firmwarecore_i9-10920xxeon_d-2712txeon_w-1290_firmwarecore_i7-10750h_firmwareceleron_g4920_firmwarecore_i3-10105tcore_i5-11400tcore_i5-11300hcore_i9-11900kfcore_i3-10325core_i3-7101te_firmwarecore_i7-10875hxeon_platinum_8356hpentium_gold_g5400_firmwarecore_i9-11900k_firmwarecore_i3-10100core_i5-8200y_firmwarecore_i7-8550u_firmwarecore_i5-1035g7_firmwarecore_i7-10700f_firmwaremicrocodecore_i5-7640x_firmwarexeon_gold_5318h_firmwarexeon_silver_4214y_firmwarecore_i5-9400core_i3-8100txeon_d-2733ntxeon_platinum_8260core_i3-7120txeon_bronze_3204_firmwarexeon_gold_5320h_firmwarexeon_d-2142it_firmwarecore_i5-7500t_firmwarecore_i7-8650uxeon_bronze_3204xeon_silver_4314core_i5-1145grexeon_gold_6246rxeon_w-11865mrexeon_gold_5217xeon_e-2234_firmwarecore_i3-7320t_firmwarecore_i5-11260h_firmwarexeon_gold_5222_firmwarexeon_w-3245core_i3-10110y_firmwarecore_i5-1035g4_firmwarecore_i5-8500bcore_i7-1185g7core_i7-1195g7core_i5-8269uxeon_e-2288gcore_i7-8709g_firmwarecore_i7-11700_firmwarexeon_gold_6240yxeon_w-1270p_firmwarecore_i5-11500he_firmwarexeon_w-2195_firmwarexeon_gold_6208ucore_i5-8279u_firmwarecore_i5-1145g7_firmwarecore_i5-9500f_firmwarecore_i5-10600t_firmwarexeon_gold_6252n_firmwarecore_i5-10210y_firmwarecore_i3-7350kxeon_w-2265_firmwarexeon_gold_6230r_firmwarecore_i5-8250ucore_i3-10305celeron_g5900_firmwareceleron_g5920_firmwarecore_i7-9700txeon_w-1370p_firmwarecore_i7-7820eqxeon_gold_6252nxeon_gold_6244xeon_w-1290t_firmwarexeon_gold_6330_firmwarecore_i7-8650u_firmwarexeon_w-3245_firmwarexeon_gold_6226_firmwarecore_i3-9350kfxeon_w-1370pcore_i9-9900k_firmwarecore_i7-7700k_firmwarexeon_w-2135_firmwarecore_i3-1115g4e_firmwarecore_i5-1130g7xeon_platinum_8354h_firmwarexeon_platinum_8256xeon_gold_6238l_firmwarecore_i9-9900xxeon_gold_5318hxeon_w-2125_firmwarecore_i5-8365u_firmwarecore_i5-10500hxeon_w-2175_firmwarexeon_e3-1275_v6core_i9-9990xecore_i3-9300txeon_gold_6262v_firmwarexeon_e-2278gxeon_platinum_8260ycore_i3-8100h_firmwarecore_i3-1115g4_firmwarexeon_w-1370_firmwarecore_i9-9980xecore_i7-10875h_firmwarexeon_d-2142itcore_i5-10500t_firmwarexeon_silver_4210t_firmwarecore_i5-8265u_firmwarexeon_e-2374gcore_i9-10900x_firmwarexeon_e3-1505m_v6_firmwarecore_i5-10600all_flash_fabric-attached_storage_8300xeon_platinum_8276core_i3-1115g4ecore_i3-9350kxeon_w-1350core_i5-8500_firmwarexeon_w-11155mle_firmwarecore_i9-11980hk_firmwarecore_i5-1145g7ecore_i7-7700t_firmwarexeon_gold_5320t_firmwarexeon_w-3275_firmwarecore_i5-11500hecore_i3-10320core_i5-8200yxeon_w-2275celeron_g4900_firmwarexeon_e-2144gxeon_e3-1245_v6_firmwarexeon_w-1350pcore_i9-10940x_firmwarexeon_gold_6230rcore_i7-8569uall_flash_fabric-attached_storage_500fxencore_i7-7700_firmwarecore_i5-10500txeon_d-1712tr_firmwarexeon_platinum_8353h_firmwarecore_i7-1185g7exeon_gold_5218rxeon_gold_5318yxeon_bronze_3206rxeon_gold_6226rcore_i3-8100bcore_i5-9600tcore_i3-7101e_firmwarecore_i3-7020u_firmwarecore_i3-9320core_i5-11400xeon_d-2775tecore_i7-1068g7_firmwarecore_i7-1065g7core_i9-10980hk_firmwarecore_i3-8130uxeon_platinum_8276l_firmwarexeon_w-10885m_firmwarecore_i3-9100_firmwarexeon_w-3245mcore_i7-11370h_firmwarexeon_e-2378gcore_i7-1160g7core_i3-10105f_firmwarexeon_e3-1501l_v6_firmwarexeon_e-2124g_firmwarecore_i7-9700kfcore_i5-8305g_firmwarecore_i5-7500_firmwarecore_i7-10870h_firmwarecore_i5-8400hcore_i3-1110g4_firmwarexeon_platinum_8360hl_firmwarecore_i3-1110g4xeon_gold_6326xeon_gold_5317_firmwarecore_i5-10200hxeon_e-2226gxeon_d-2775te_firmwarecore_i3-10100f_firmwarecore_i3-8145ucore_i7-11700xeon_gold_5318y_firmwarecore_i5-9600_firmwarecore_i3-7020uxeon_platinum_8268_firmwarexeon_e3-1501l_v6xeon_gold_6262vcore_i3-8109ucore_i9-11900tcore_i7-9700f_firmwarecore_i7-1195g7_firmwarecore_i3-7100e_firmwarecore_i3-7300xeon_e-2378core_i7-11850hcore_i9-11900xeon_e-2134_firmwarecore_i5-10600_firmwarexeon_platinum_8376hxeon_silver_4210_firmwarecore_i7-7600u_firmwarecore_i5-8400bcore_i3-9300t_firmwarecore_i7-10610u_firmwarexeon_gold_6248rcore_i5-9500_firmwarexeon_silver_4214r_firmwarexeon_platinum_8276_firmwarecore_i7-11850hexeon_w-1290tcore_i5-8400h_firmwarexeon_w-11155mre_firmwarepentium_gold_g6505tcore_i7-9700fcore_i9-10980hkcore_i9-9820x_firmwarexeon_e-2136pentium_gold_6405u_firmwarecore_i7-10510ucore_i7-9700kcore_i5-10400t_firmwarecore_i3-8100xeon_w-2265xeon_gold_5215_firmwarecore_i9-11900hxeon_w-10855mxeon_w-2245_firmwarexeon_w-1390p_firmwarexeon_w-10855m_firmwarecore_i3-11100hexeon_d-1712trcore_i3-7300_firmwarexeon_w-11555mrecore_i7-11700k_firmwarecore_i5-7287u_firmwarecore_i7-7700xeon_d-2752ter_firmwarepentium_gold_g6505t_firmwarecore_i3-7102exeon_platinum_8280l_firmwareceleron_5205u_firmwarexeon_e-2124_firmwarecore_i7-8700_firmwarexeon_e3-1240_v6_firmwarecore_i7-1160g7_firmwarexeon_e3-1501m_v6xeon_gold_6250lcore_i5-8365uxeon_gold_6210uxeon_d-2187ntcore_i5-9600kfxeon_d-1732tecore_i5-8500b_firmwareall_flash_fabric-attached_storage_a250core_i5-7600core_i9-7940xxeon_platinum_8380hlxeon_w-3265_firmwarecore_i9-9960xcore_i7-10700fcore_i5-1030g4_firmwarecore_i7-8557u_firmwarecore_i5-1145g7core_i7-10750hcore_i3-7120_firmwarexeon_platinum_8253xeon_w-3235_firmwarecore_i3-8300xeon_w-1390xeon_gold_6242r_firmwarexeon_e-2186gcore_i5-7400txeon_e-2174gcore_i5-7260ucore_i7-8700bxeon_w-2145_firmwarexeon_d-2145ntxeon_gold_6238xeon_w-1250pcore_i5-11400t_firmwarecore_i3-1115g4core_i7-11700f_firmwarecore_i7-7800xxeon_e3-1275_v6_firmwarexeon_e-2334_firmwarecore_i5-10210yxeon_e3-1225_v6_firmwarecore_i5-1140g7core_i3-8100f_firmwarecore_i9-9900kf_firmwarexeon_w-3275mcore_i5-9500fcore_i5-10210u_firmwarecore_i5-10600txeon_e-2356gcore_i3-7300t_firmwareall_flash_fabric-attached_storage_c800core_i9-9900kscore_i5-10500h_firmwarecore_i5-9600xeon_gold_5315ypentium_gold_g6500t_firmwarecore_i5-7300u_firmwarecore_i3-9100fxeon_platinum_8354hcore_i9-11900_firmwarexeon_e-2224_firmwarexeon_gold_6256_firmwarepentium_gold_6405ucore_i7-10700kceleron_g5925_firmwarecore_i3-9320_firmwarecore_i5-8400b_firmwarexeon_e3-1280_v6core_i7-9800x_firmwarecore_i3-8100_firmwarecore_i7-11700kxeon_silver_4214rxeon_d-1715ter_firmwarexeon_e-2124core_i5-7287ucore_i7-10710ucore_i7-10700kfxeon_d-2141ixeon_w-1350p_firmwarecore_i5-8500t_firmwarecore_i3-11100he_firmwarexeon_e-2276g_firmwarexeon_gold_6230n_firmwarexeon_gold_5222core_i7-8706g_firmwareall_flash_fabric-attached_storage_a800xeon_w-2133_firmwarecore_i9-11900t_firmwarexeon_platinum_8360hlxeon_e3-1535m_v6core_i5-7400t_firmwarexeon_platinum_9221core_i9-9900core_i7-10510y_firmwarecore_i7-11390h_firmwarexeon_w-11865mle_firmwarexeon_e-2146g_firmwareceleron_g5905txeon_e-2388gcore_i7-7800x_firmwarexeon_w-2225_firmwarexeon_platinum_8360h_firmwarexeon_d-2752terxeon_gold_6238t_firmwarecore_i3-7100_firmwarecore_i9-9820xcore_i3-1120g4_firmwarexeon_w-2155xeon_e-2278g_firmwarecore_i7-8550ucore_i3-9100txeon_w-2145core_i5-8310y_firmwarecore_i9-9900x_firmwarecore_i7-11375h_firmwarecore_i9-10900_firmwarexeon_platinum_9222_firmwarexeon_platinum_8253_firmwarecore_i5-10505_firmwarecore_i3-7167uxeon_e-2176g_firmwarecore_i7-7567uxeon_w-2295_firmwarecore_i3-8145u_firmwareenterprise_linuxxeon_silver_4214xeon_gold_5315y_firmwarecore_i5-11260hcore_i3-7340_firmwarexeon_d-2161ixeon_silver_4210rcore_i5-10300h_firmwarexeon_d-2141i_firmwarecore_i7-7660u_firmwarecore_i7-11850h_firmwarecore_i5-8210yxeon_gold_5218bcore_i7-8750h_firmwarecore_i9-11900f_firmwarecore_i5-10200h_firmwarecore_i3-7300txeon_silver_4216_firmwarecore_i7-11700t_firmwarecore_i3-9100f_firmwarexeon_e-2246g_firmwarecore_i7-1185gre_firmwarepentium_gold_g6400_firmwarexeon_e-2174g_firmwarexeon_d-2187nt_firmwarecore_i5-11500core_i5-1135g7core_i5-8500core_i5-7600_firmwarexeon_w-3275m_firmwarecore_i7-10700kf_firmwarexeon_w-3235xeon_gold_6222v_firmwarexeon_e-2336_firmwarexeon_platinum_8260_firmwarexeon_gold_6226r_firmwarexeon_w-2225pentium_gold_g6405core_i7-7560u_firmwarexeon_w-2133core_i3-10305txeon_gold_6328hlcore_i9-9900t_firmwarepentium_gold_g5500_firmwarexeon_w-2223xeon_silver_4210r_firmwarecore_i9-7920x_firmwarecore_i7-8665ucore_i3-8300tall_flash_fabric-attached_storage_a900all_flash_fabric-attached_storage_a400core_i7-11700fxeon_e-2236core_i7-10850hxeon_e-2236_firmwarexeon_gold_6338t_firmwarecore_i3-1125g4_firmwarexeon_e-2126g_firmwarexeon_gold_6238_firmwarecore_i7-11800h_firmwareceleron_g5905core_i9-7960x_firmwarecore_i5-8400core_i3-10300xeon_gold_6246core_i5-1140g7_firmwarecore_i7-8086kpentium_gold_g5500t_firmwarexeon_w-3245m_firmwarecore_i9-11900kf_firmwarecore_i5-8600k_firmwarexeon_e3-1285_v6_firmwarexeon_e-2134xeon_d-2163itxeon_w-1390txeon_w-1270core_i5-10310y_firmwarecore_i3-1000g1core_i7-10510yxeon_gold_5215lxeon_silver_4215_firmwarecore_i5-7360u_firmwarexeon_w-2275_firmwarecore_i5-8210y_firmwarecore_i9-7960xcore_i5-9600kcore_i7-7820xceleron_g5905t_firmwarecore_i3-10305t_firmwarecore_i9-10900f_firmwarecore_i5-1155g7core_i3-9100t_firmwarecore_i5-11320h_firmwarexeon_gold_6250l_firmwarexeon_d-1715terxeon_gold_6258rceleron_g5900xeon_gold_6240lxeon_gold_6250core_i5-8350uxeon_gold_6348hxeon_w-3223_firmwarexeon_d-2173itcore_i7-11700txeon_d-2123itxeon_e-2246gcore_i3-10100y_firmwarecore_i5-11400h_firmwarexeon_gold_5218n_firmwarexeon_w-2255_firmwarexeon_gold_6330h_firmwarecore_i7-8700b_firmwarexeon_gold_5218tcore_i9-8950hkxeon_gold_6242_firmwarexeon_e-2104g_firmwarexeon_w-2123_firmwarexeon_platinum_8356h_firmwarexeon_e3-1501m_v6_firmwarexeon_e-2334core_i3-7350k_firmwarexeon_d-2166nt_firmwarecore_i9-10885hxeon_d-2712t_firmwarexeon_gold_6328hl_firmwarecore_i3-9300xeon_gold_5218r_firmwarexeon_e-2244gcore_i9-9900kcore_i3-9350kf_firmwarexeon_e-2176gxeon_e-2324gcore_i7-8709gcore_i3-7120core_i9-9920xcore_m3-8100y_firmwarexeon_e-2104gcore_i7-8557uxeon_silver_4214_firmwarexeon_e-2278ge_firmwarecore_i5-9500tcore_i5-8260u_firmwarecore_i7-8700tcore_i3-10305_firmwarexeon_platinum_9242xeon_d-2143it_firmwarexeon_d-1735trcore_i5-7400xeon_platinum_8280lcore_i5-11400fcore_i5-11500_firmwarecore_i3-7102e_firmwarexeon_platinum_8280_firmwarecore_i3-7320core_i7-1180g7xeon_e-2378g_firmwarexeon_w-1390_firmwarexeon_e3-1230_v6core_i9-11950h_firmwarecore_i5-1035g1xeon_gold_6230nxeon_w-3265xeon_gold_5218ncore_i7-8565u_firmwarexeon_gold_6246_firmwarecore_i5-11400f_firmwarexeon_platinum_9221_firmwarexeon_e-2186g_firmwarexeon_gold_6248r_firmwarexeon_e-2124gcore_i5-7600t_firmwarexeon_gold_6326_firmwarecore_i7-1165g7core_i5-11600kcore_i9-7980xe_firmwarecore_i7-11390hcore_i9-11900h_firmwarecore_i5-1030g4xeon_gold_5220xeon_e-2234core_i5-10500xeon_gold_6254xeon_silver_4209t_firmwarexeon_e-2356g_firmwarecore_i5-9400fcore_i7-9700t_firmwarecore_i3-7320tcore_i5-7440eqxeon_gold_5215l_firmwarexeon_w-1250xeon_platinum_8376hl_firmwarecore_i7-7820x_firmwarecore_i5-8279ucore_i3-8130u_firmwarexeon_gold_6336ycore_i3-7100upentium_gold_g6505_firmwarecore_i3-7101tecore_i5-11400hxeon_w-3275xeon_d-1735tr_firmwarecore_i5-7600kxeon_platinum_8270_firmwarecore_i3-1000g4_firmwarexeon_e-2126gxeon_silver_4209txeon_gold_6234_firmwarexeon_gold_6210u_firmwarecore_i3-7100t_firmwarecore_i5-11400_firmwarecore_i5-7360ucore_i3-8100fcore_i3-7340xeon_gold_5218t_firmwarexeon_gold_6248core_i9-11980hkcore_i5-10600kxeon_platinum_8260l_firmwarexeon_e3-1220_v6xeon_e-2388g_firmwarexeon_platinum_8280core_m3-8100ycore_i7-1165g7_firmwarexeon_platinum_8380hl_firmwarecore_i9-10900kfxeon_w-11155mrecore_i5-8250u_firmwarecore_i7-7567u_firmwarecore_i3-7320_firmwarecore_i5-8400_firmwarexeon_gold_6336y_firmwarecore_i3-1120g4xeon_d-2146nt_firmwarecore_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i5-10600k_firmwarecore_i5-10310yxeon_gold_6330hxeon_w-1290pcore_i5-8400t_firmwarexeon_gold_5218b_firmwarexeon_e-2286gxeon_gold_6222vxeon_w-11155mlexeon_platinum_8376hlxeon_gold_6242core_i5-8260ucore_i3-10100t_firmwarecore_i9-10900t_firmwarecore_i7-10810u_firmwarecore_i5-11600kf_firmwarexeon_e-2244g_firmwarecore_i7-10810ucore_i7-11700kf_firmwarecore_i5-10400f_firmwarexeon_platinum_8270core_i3-10105_firmwarexeon_gold_6242rxeon_e3-1245_v6xeon_silver_4215core_i3-1115grexeon_w-2235xeon_e-2378_firmwarecore_i7-8850hcore_i5-11500hcore_i3-10100fcore_i3-8300_firmwarecore_i9-9900_firmwarecore_i7-1065g7_firmwarecore_i5-1135g7_firmwarecore_i9-10900xxeon_gold_6238txeon_silver_4214ycore_i5-8257u_firmwarecore_i9-10980xecore_i9-10900kf_firmwarecore_i5-11600t_firmwarecore_i9-10850k_firmwarexeon_w-1290all_flash_fabric-attached_storage_2820core_i7-8809g_firmwarecore_i9-10885h_firmwarexeon_gold_6240rxeon_w-10885mceleron_g4900core_i5-1030g7_firmwarecore_i9-10900tpentium_gold_g5400core_i5-8310ycore_i5-7640xcore_i3-10110u_firmwarexeon_e-2324g_firmwarexeon_e-2278gel_firmwarexeon_gold_6226xeon_gold_6256xeon_gold_6238r_firmwarecore_i5-9500t_firmwarexeon_gold_6252core_i3-10320_firmwarecore_i3-1005g1xeon_w-11865mre_firmwarexeon_gold_6328hxeon_gold_6252_firmwarexeon_gold_6209u_firmwarecore_i9-9920x_firmwarecore_i5-8600tcore_i5-8305gxeon_platinum_8260lcore_i7-10850h_firmwarecore_i5-9400t_firmwarecore_i7-8559uxeon_e-2146gcore_i7-9700_firmwarexeon_d-2177ntpentium_gold_g6400xeon_w-2175Intel(R) Processors
CWE ID-CWE-1342
Information Exposure through Microarchitectural State after Transient Execution
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-51477
Matching Score-6
Assigner-IBM Corporation
ShareView Details
Matching Score-6
Assigner-IBM Corporation
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 5.94%
||
7 Day CHG-0.02%
Published-28 Mar, 2025 | 23:51
Updated-07 Jul, 2025 | 16:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
IBM InfoSphere Information Server information disclosure

IBM InfoSphere Information Server 11.7 could allow an authenticated to obtain sensitive username information due to an observable response discrepancy.

Action-Not Available
Vendor-Linux Kernel Organization, IncMicrosoft CorporationIBM Corporation
Product-aixinfosphere_information_serverwindowslinux_kernelInfoSphere Information Server
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-50102
Matching Score-6
Assigner-kernel.org
ShareView Details
Matching Score-6
Assigner-kernel.org
CVSS Score-5.5||MEDIUM
EPSS-0.04% / 8.88%
||
7 Day CHG~0.00%
Published-05 Nov, 2024 | 17:10
Updated-04 May, 2025 | 09:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
x86: fix user address masking non-canonical speculation issue

In the Linux kernel, the following vulnerability has been resolved: x86: fix user address masking non-canonical speculation issue It turns out that AMD has a "Meltdown Lite(tm)" issue with non-canonical accesses in kernel space. And so using just the high bit to decide whether an access is in user space or kernel space ends up with the good old "leak speculative data" if you have the right gadget using the result: CVE-2020-12965 “Transient Execution of Non-Canonical Accesses“ Now, the kernel surrounds the access with a STAC/CLAC pair, and those instructions end up serializing execution on older Zen architectures, which closes the speculation window. But that was true only up until Zen 5, which renames the AC bit [1]. That improves performance of STAC/CLAC a lot, but also means that the speculation window is now open. Note that this affects not just the new address masking, but also the regular valid_user_address() check used by access_ok(), and the asm version of the sign bit check in the get_user() helpers. It does not affect put_user() or clear_user() variants, since there's no speculative result to be used in a gadget for those operations.

Action-Not Available
Vendor-Linux Kernel Organization, Inc
Product-linux_kernelLinux
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-38562
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.13% / 33.68%
||
7 Day CHG+0.01%
Published-18 Oct, 2021 | 08:52
Updated-04 Aug, 2024 | 01:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Best Practical Request Tracker (RT) 4.2 before 4.2.17, 4.4 before 4.4.5, and 5.0 before 5.0.2 allows sensitive information disclosure via a timing attack against lib/RT/REST2/Middleware/Auth.pm.

Action-Not Available
Vendor-n/aBest Practical Solutions, LLCFedora ProjectDebian GNU/Linux
Product-debian_linuxrequest_trackerfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-35477
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.01% / 0.22%
||
7 Day CHG~0.00%
Published-02 Aug, 2021 | 03:57
Updated-04 Aug, 2024 | 00:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In the Linux kernel through 5.13.7, an unprivileged BPF program can obtain sensitive information from kernel memory via a Speculative Store Bypass side-channel attack because a certain preempting store operation does not necessarily occur before a store operation that has an attacker-controlled value.

Action-Not Available
Vendor-n/aLinux Kernel Organization, IncFedora ProjectDebian GNU/Linux
Product-debian_linuxlinux_kernelfedoran/a
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-26313
Matching Score-6
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-6
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.08% / 23.82%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 11:23
Updated-16 Sep, 2024 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
AMD Speculative Code Store Bypass

Potential speculative code store bypass in all supported CPU products, in conjunction with software vulnerabilities relating to speculative execution of overwritten instructions, may cause an incorrect speculation and could result in data leakage.

Action-Not Available
Vendor-Xen ProjectAdvanced Micro Devices, Inc.Intel CorporationDebian GNU/LinuxBroadcom Inc.Arm Limited
Product-debian_linuxcore_i7-7700kryzen_5_5600xxeon_silver_4214core_i7-10700kryzen_threadripper_2990wxcortex-a72xenryzen_7_2700xcore_i9-9900kbcm2711All supported processors
CWE ID-CWE-208
Observable Timing Discrepancy
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-21173
Matching Score-6
Assigner-Chrome
ShareView Details
Matching Score-6
Assigner-Chrome
CVSS Score-6.5||MEDIUM
EPSS-1.16% / 77.68%
||
7 Day CHG~0.00%
Published-09 Mar, 2021 | 17:46
Updated-03 Aug, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Side-channel information leakage in Network Internals in Google Chrome prior to 89.0.4389.72 allowed a remote attacker to leak cross-origin data via a crafted HTML page.

Action-Not Available
Vendor-Fedora ProjectGoogle LLCDebian GNU/Linux
Product-chromedebian_linuxfedoraChrome
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-0089
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-6.5||MEDIUM
EPSS-0.04% / 12.29%
||
7 Day CHG~0.00%
Published-09 Jun, 2021 | 19:07
Updated-03 Aug, 2024 | 15:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable response discrepancy in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationFedora ProjectDebian GNU/Linux
Product-itanium_processorsdebian_linuxcore_processors_firmwarepentium_processors_firmwarefedoraxeon_processors_firmwarexeon_processorsceleron_processorsitanium_processors_firmwarecore_processorsceleron_processors_firmwarepentium_processorsIntel(R) Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2020-8695
Matching Score-6
Assigner-Intel Corporation
ShareView Details
Matching Score-6
Assigner-Intel Corporation
CVSS Score-5.5||MEDIUM
EPSS-0.14% / 35.26%
||
7 Day CHG-0.03%
Published-12 Nov, 2020 | 18:03
Updated-04 Aug, 2024 | 10:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Observable discrepancy in the RAPL interface for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.

Action-Not Available
Vendor-n/aIntel CorporationFedora ProjectDebian GNU/Linux
Product-xeon_e3-1501m_firmwarepentium_g4500_firmwarepentium_silver_n5000_firmwareceleron_3955u_firmwarexeon_e3-1235lpentium_4415ycore_i3-6300core_i5-1035g7core_i3-6100e_firmwarepentium_gold_g5420xeon_e-2124g_firmwarecore_i7-9700kfpentium_gold_g5420t_firmwarecore_i5-8305g_firmwarecore_i5-7500_firmwarecore_i5-8400hceleron_g3940pentium_gold_g5420_firmwarecore_i5-7y54xeon_e3-1535m_firmwarecore_i7-1060g7_firmwarecore_i3-7007u_firmwarecore_i7-6650u_firmwarecore_i9-9900kfpentium_g4400tceleron_g3920t_firmwarepentium_gold_g5400tcore_i3-10100f_firmwarexeon_e3-1268lcore_i7-8670core_i5-1035g4core_i3-8145ucore_i7-6822eqcore_i5-7210u_firmwarecore_i7-6700tecore_i3-7020ucore_i7-6567u_firmwarecore_i3-8109uxeon_e3-1565l_firmwarecore_i7-7600ucore_i5-9400f_firmwarecore_i5-7y57_firmwarecore_i3-6100t_firmwarecore_i3-7100e_firmwarecore_i3-7100exeon_e3-1275_firmwarecore_i5-6442eq_firmwarecore_i5-8269u_firmwarexeon_e-2278gexeon_e3-1268l_firmwarexeon_e-2134_firmwarecore_i5-6287u_firmwarexeon_e3-1578l_firmwarecore_m5-6y54core_i5-6600kceleron_n4100core_i3-7120t_firmwareceleron_g3940_firmwarecore_i7-7600u_firmwarepentium_g4520_firmwarecore_i5-8400bcore_i7-10610u_firmwarepentium_g4420core_i7-10710u_firmwarecore_i7-7820hkcore_i5-6500te_firmwarecore_i5-8550core_i5-8400h_firmwareceleron_n4120core_i7-6970hqcore_i5-7500ucore_i3-6120tceleron_3865u_firmwarecore_i5-8600xeon_e3-1225xeon_e-2136celeron_g3930tecore_i7-9700kcore_i5-9400_firmwarecore_i7-8500y_firmwareceleron_3865ucore_i3-8100core_i7-1060g7core_i7-7740x_firmwarecore_i9-10900xeon_e3-1545mpentium_g4520t_firmwarecore_m7-6y75xeon_e3-1270_firmwarecore_i5-6600t_firmwareceleron_g4900tcore_m3-6y30fedoraceleron_3855u_firmwarecore_4205ucore_i5-7287u_firmwarecore_i7-7700celeron_g3900te_firmwarecore_i7-7820hq_firmwarecore_i3-7102ecore_i7-7920hq_firmwarecore_i5-8600kxeon_e-2124_firmwarecore_i7-8700k_firmwarecore_i7-8700_firmwarexeon_e3-1220core_i7-8750hceleron_g3900_firmwarecore_i5-8365ucore_i5-9600kfcore_i5-8500b_firmwarepentium_4410ycore_i3-7100u_firmwarecore_i5-7600core_i3-6100h_firmwarexeon_e-2286mcore_i5-1030g4_firmwarecore_i7-10750hcore_i3-7120_firmwarecore_i7-7820eq_firmwarecore_i5-8550_firmwarecore_i3-8300core_i3-1000g4xeon_e-2186gcore_i5-7267u_firmwarecore_i5-7400tpentium_4415y_firmwarexeon_e3-1535mxeon_e3-1505m_firmwarexeon_e-2174gcore_i7-8809gceleron_j4105core_i5-7260ucore_i7-8700bcore_i5-8420_firmwarecore_i3-8000t_firmwarecore_i7-7500u_firmwarecore_i5-7267ucore_i3-8020_firmwarecore_i7-7820hk_firmwarecore_i9-9900kf_firmwarecore_i7-6560uxeon_e3-1505lpentium_g4420tcore_i5-8300hcore_i5-8600t_firmwarecore_i5-6600_firmwareceleron_j4125_firmwarepentium_gold_g5500tpentium_g4400_firmwarecore_i7-8510y_firmwarexeon_e3-1565lcore_i3-7110u_firmwarecore_i5-7300u_firmwarecore_i5-8600_firmwarecore_i5-9600kf_firmwarexeon_e3-1260lcore_i7-7510u_firmwarecore_i7-9750hfceleron_g4920core_i5-9300h_firmwarecore_i3-6167upentium_silver_j5005xeon_e-2278gelcore_i5-8400b_firmwarecore_i7-6700t_firmwarecore_i3-8100_firmwarecore_i7-7740xxeon_e3-1240_firmwarecore_i7-6500ucore_i3-7110ucore_i7-6500u_firmwarecore_i3-8120celeron_g3902exeon_e-2124core_i9-9880hcore_i5-7287ucore_i7-10710ucore_i5-8500t_firmwarexeon_e3-1558ldebian_linuxcore_i3-7100h_firmwarecore_i5-8300h_firmwarexeon_e-2136_firmwarecore_i5-6300ucore_i7-8565ucore_i5-7300hq_firmwarexeon_e3-1245core_i5-7300hqcore_i7-7560ucore_i7-8706g_firmwarecore_i5-6600k_firmwarepentium_gold_g5420tcore_i3-6110u_firmwarecore_i3-6100hcore_i5-7400t_firmwarecore_i5-6200u_firmwarecore_i3-8100t_firmwarecore_i5-8259upentium_gold_g5500xeon_e-2146g_firmwarecore_i8350kcore_i7-8850h_firmwarecore_m7-6y75_firmwarecore_i7-6700hqpentium_g4500t_firmwarecore_i7-9700kf_firmwarecore_i7-9850h_firmwarecore_i5-6350hqxeon_e3-1515m_firmwarecore_i7-6660u_firmwarecore_i5-7600tcore_i3-6100te_firmwarecore_i5-6350hq_firmwarexeon_e-2278g_firmwarecore_i7-7500ucore_i7-8550ucore_i3-6120_firmwarexeon_e3-1505mcore_i5-6310u_firmwareceleron_j4025core_i5-8310y_firmwarecore_i5-6400_firmwarecore_i7-6650ucore_i5-9300hcore_i5-6210uxeon_e3-1240core_i9-10900_firmwarecore_i7-8559u_firmwarecore_i7-10610ucore_i5-1035g1_firmwarecore_i7-8665u_firmwarexeon_e-2176g_firmwarecore_i3-6100tcore_i7-8500ycore_i5-9400hcore_i7-7567uxeon_e3-1240l_firmwareceleron_g3900e_firmwarecore_i3-8145u_firmwarepentium_4405u_firmwarecore_i3-7367ucore_i3-7340_firmwarecore_i7-7660u_firmwarecore_i7-7820hqcore_i5-6260u_firmwarecore_i5-8210yceleron_g3920tcore_i7-8750h_firmwarecore_i3-6100ecore_i3-8300t_firmwarecore_i3-8109u_firmwarecore_i5-7400_firmwarexeon_e3-1280xeon_e3-1260l_firmwareceleron_3955ucore_i7-9700k_firmwarexeon_e-2288g_firmwareceleron_n4000core_i5-7y54_firmwarepentium_4405y_firmwarecore_i7-6567uxeon_e-2176m_firmwarexeon_e-2174g_firmwarecore_i3-7101ecore_i9-8950hk_firmwarecore_i5-8500core_i7-6870hq_firmwarecore_i3-8000_firmwarecore_i5-7600_firmwarecore_i7-7510ucore_i8130ucore_i7-8510ycore_i5-6267u_firmwarecore_i5-8265ucore_i3-7007ucore_i5-6300hqcore_i3-6110ucore_i5-6440hqcore_i7-7y75pentium_gold_g5400t_firmwarecore_i7-7560u_firmwarecore_i7-6700core_i5-7y57celeron_g3920_firmwarexeon_e-2486g_firmwarepentium_silver_j5040core_i5-7500tcore_i5-9600k_firmwarepentium_gold_g5500_firmwarecore_i8350k_firmwarepentium_gold_g5600celeron_j4125core_i3-6102e_firmwarexeon_e3-1230_firmwarecore_i7-7700kcore_i7-8705gpentium_g4540_firmwarecore_i7-8665ucore_i3-8300tcore_i7-7660ucore_i7-6600ucore_i3-6100u_firmwarecore_i3-8120_firmwarecore_i7-8706gcore_i9-9880h_firmwarecore_i7-8700t_firmwarexeon_e-2126g_firmwarecore_i5-6310ucore_i5-7500u_firmwarecore_i7-8700core_i5-8259u_firmwarexeon_e3-1501lcore_i3-6300tcore_i3-7130u_firmwarecore_i5-8400core_i3-6120core_i7-8705g_firmwarecore_i7-7700tcore_i5-7260u_firmwarepentium_gold_g5500t_firmwarecore_i7-6600u_firmwarecore_i5-7600k_firmwarecore_i7-6770hqcore_i7-8700kxeon_e-2486gcore_i5-7200u_firmwarecore_i5-8600k_firmwarecore_i5-7442eqxeon_e-2134xeon_e3-1545m_firmwarepentium_g4500txeon_e3-1515mcore_i5-1030g7core_i5-7442eq_firmwarexeon_e-2144g_firmwarecore_i3-1000g1core_i5-7360u_firmwarecore_i5-8210y_firmwarecore_i5-6442eqcore_i5-8420tcore_i5-9600kceleron_g3900core_i3-6300_firmwarecore_i7-7700hqceleron_g4900t_firmwarecore_i3-8100hxeon_e3-1225_firmwarecore_i7-6870hqpentium_g4500core_i5-8350ucore_i3-1005g1_firmwareceleron_n4000_firmwarecore_i3-6320t_firmwarecore_i5-7300ucore_i5-6440hq_firmwarecore_m3-6y30_firmwarepentium_4415u_firmwarecore_i5-8500tceleron_3965y_firmwarecore_i5-7500core_i5-6400core_i5-7200upentium_g4540core_i5-8350u_firmwarecore_i7-8700b_firmwareceleron_g3930ecore_i9-8950hkpentium_g4520pentium_4405ucore_i7-6820hq_firmwarecore_i3-6320_firmwarecore_i7-7920hqxeon_e3-1575m_firmwarepentium_g4400t_firmwarepentium_gold_g5600_firmwarecore_i5-8400tcore_i3-6100_firmwarexeon_e3-1578lcore_i5-8420core_i7-8670tceleron_j4105_firmwarecore_i7-6660ucore_i7-10750h_firmwarexeon_e3-1240lceleron_3965uceleron_g4920_firmwarepentium_silver_n5000core_i3-6120t_firmwarecore_i5-6500_firmwarecore_i3-7100hcore_i3-7101te_firmwarexeon_e3-1220_firmwarecore_i5-6500t_firmwarexeon_e3-1501l_firmwarecore_i9-9900kxeon_e-2176gpentium_gold_g5400_firmwarecore_i3-6320tcore_i7-8709gcore_i7-7y75_firmwarecore_i5-8200y_firmwarecore_i7-8550u_firmwareceleron_j4025_firmwarecore_i5-1035g7_firmwarepentium_silver_j5040_firmwarecore_i3-7120pentium_g4420t_firmwarecore_i5-6287ucore_i5-7640x_firmwarecore_i5-9400core_m3-8100y_firmwarecore_i3-8100tpentium_4415ucore_i5-6500tcore_i5-6260ucore_i3-7120tcore_i7-6700k_firmwarecore_i5-8650k_firmwarexeon_e-2278ge_firmwarecore_i5-7500t_firmwarecore_i7-8700tcore_i7-6820hk_firmwarecore_i7-6820hqcore_i5-7400xeon_e3-1501mcore_i7-8650ucore_i3-7102e_firmwarexeon_e3-1585_firmwarecore_m3-7y30_firmwarexeon_e3-1245_firmwarexeon_e-2286m_firmwarecore_i5-6600core_i7-6700tcore_i7-6920hqcore_i3-6167u_firmwarexeon_e3-1585core_i3-6100ucore_i7-6700_firmwarecore_i3-7320t_firmwarepentium_g4400tecore_i5-1035g1pentium_silver_n5030xeon_e3-1280_firmwarecore_i7-6510u_firmwarecore_i7-8565u_firmwarecore_i7-6822eq_firmwarexeon_e-2186g_firmwarecore_i8130u_firmwarecore_i5-1035g4_firmwarecore_i5-8500bxeon_e-2124gcore_i5-7600t_firmwarecore_i5-8269ucore_i5-7440hq_firmwarecore_i5-1030g4xeon_e-2288gcore_i5-6300hq_firmwarecore_i7-8709g_firmwarepentium_g4520tceleron_3965u_firmwareceleron_g3930e_firmwarecore_5405u_firmwarecore_i7-9850hcore_i5-9400fcore_i7-6700kcore_i3-8000core_i3-6320celeron_n4100_firmwarecore_i3-7320tcore_i5-7440eqcore_i7-6820eq_firmwarepentium_4410y_firmwarepentium_silver_j5005_firmwareceleron_g3900tcore_i3-8000tceleron_g3920core_i5-6400tcore_i3-7100ucore_i3-7101tecore_i5-7600kcore_m5-6y57core_i5-8250ucore_i3-1000g4_firmwarecore_5405uxeon_e-2126gcore_i7-6920hq_firmwarecore_i7-7820eqxeon_e3-1275core_i5-7360ucore_i5-6500core_i3-7340core_i7-8650u_firmwarexeon_e3-1235l_firmwarecore_i5-6200ucore_i7-8670t_firmwarecore_m3-8100ycore_i9-9900k_firmwarecore_i7-7700k_firmwarecore_i7-6700hq_firmwarecore_i5-8650_firmwarecore_i5-8250u_firmwareceleron_n4120_firmwarecore_i7-7567u_firmwareceleron_g3902e_firmwarecore_i5-8400_firmwarecore_i7-8670_firmwarexeon_e-2176mcore_i7-6970hq_firmwarecore_i7-7700hq_firmwarecore_i7-6820hkpentium_g4400core_i5-7440eq_firmwarecore_i3-1000g1_firmwarecore_i7-9750hf_firmwarecore_i5-8400t_firmwarecore_i5-6400t_firmwarecore_i3-6102ecore_i5-8365u_firmwarecore_i7-6700te_firmwarecore_i5-6600tpentium_g4420_firmwarecore_i3-8020core_i7-6510upentium_silver_n5030_firmwarecore_i5-6360u_firmwarecore_i3-8100h_firmwarexeon_e-2278gcore_i7-8850hcore_i5-7210ucore_i3-7130uceleron_j4005_firmwarecore_i5-8265u_firmwarecore_i3-10100fcore_i7-6560u_firmwarecore_i3-8300_firmwarecore_i7-6820eqcore_i7-1065g7_firmwareceleron_g3930te_firmwarexeon_e3-1558l_firmwarecore_i5-8650core_i5-6500tecore_m3-7y30core_4205u_firmwarecore_i5-8500_firmwarecore_i5-6210u_firmwareceleron_n4020_firmwarecore_i5-6300u_firmwarecore_i7-8809g_firmwarexeon_e3-1575mxeon_e3-1230core_i7-7700t_firmwarecore_i9-9980hk_firmwareceleron_g4900core_i5-9400h_firmwarecore_i5-1030g7_firmwarepentium_4405ycore_i5-8420t_firmwarecore_i5-8200ypentium_gold_g5400celeron_g3900t_firmwarecore_i3-6100core_i5-8310ycore_i5-7640xceleron_n4020celeron_g4900_firmwarexeon_e-2278gel_firmwarecore_i5-7440hqxeon_e-2144gcore_i5-6360ucore_m5-6y54_firmwarexeon_e3-1505l_firmwarecore_i3-6300t_firmwarecore_m5-6y57_firmwarecore_i5-8650kceleron_g3900ecore_i7-7700_firmwarecore_i7-6770hq_firmwarecore_i5-6267uceleron_3965ypentium_g4400te_firmwareceleron_g3900tecore_i3-1005g1celeron_j4005core_i3-7020u_firmwarecore_i3-7101e_firmwareceleron_3855ucore_i5-6440eqcore_i3-7367u_firmwarecore_i5-6440eq_firmwarecore_i5-8600tcore_i7-1065g7core_i5-8305gcore_i9-9980hkcore_i7-8559uxeon_e-2146gcore_i3-6100texeon_e3-1270xeon_e3-1585l_firmwarexeon_e3-1585lIntel(R) Processors
CWE ID-CWE-203
Observable Discrepancy
CVE-2025-21336
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.08% / 23.97%
||
7 Day CHG~0.00%
Published-14 Jan, 2025 | 18:04
Updated-02 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cryptographic Information Disclosure Vulnerability

Windows Cryptographic Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_server_2022windows_server_2008windows_server_2025windows_11_23h2windows_server_2012windows_10_21h2windows_11_22h2windows_server_2016windows_10_1607windows_10_22h2windows_server_2019windows_server_2022_23h2windows_10_1507windows_10_1809windows_11_24h2Windows Server 2008 R2 Service Pack 1Windows 11 version 22H3Windows 10 Version 1607Windows Server 2008 Service Pack 2 (Server Core installation)Windows Server 2022Windows 11 version 22H2Windows Server 2016Windows Server 2012 R2Windows Server 2012Windows Server 2008 R2 Service Pack 1 (Server Core installation)Windows Server 2008 Service Pack 2Windows 10 Version 1507Windows 10 Version 21H2Windows Server 2012 (Server Core installation)Windows Server 2016 (Server Core installation)Windows 11 Version 23H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows Server 2019Windows Server 2019 (Server Core installation)Windows Server 2025Windows 10 Version 22H2Windows Server 2025 (Server Core installation)Windows 10 Version 1809Windows Server 2012 R2 (Server Core installation)Windows 11 Version 24H2Windows Server 2008 Service Pack 2
CWE ID-CWE-203
Observable Discrepancy
CVE-2024-43546
Matching Score-4
Assigner-Microsoft Corporation
ShareView Details
Matching Score-4
Assigner-Microsoft Corporation
CVSS Score-5.6||MEDIUM
EPSS-0.25% / 47.83%
||
7 Day CHG~0.00%
Published-08 Oct, 2024 | 17:35
Updated-08 Jul, 2025 | 15:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Windows Cryptographic Information Disclosure Vulnerability

Windows Cryptographic Information Disclosure Vulnerability

Action-Not Available
Vendor-Microsoft Corporation
Product-windows_10_21h2windows_server_2022_23h2windows_11_21h2windows_11_24h2windows_10_22h2windows_server_2022windows_11_22h2windows_11_23h2Windows Server 2022Windows 10 Version 21H2Windows 11 Version 24H2Windows Server 2022, 23H2 Edition (Server Core installation)Windows 11 version 22H2Windows 10 Version 22H2Windows 11 Version 23H2Windows 11 version 21H2Windows 11 version 22H3
CWE ID-CWE-203
Observable Discrepancy
CVE-2021-46778
Matching Score-4
Assigner-Advanced Micro Devices Inc.
ShareView Details
Matching Score-4
Assigner-Advanced Micro Devices Inc.
CVSS Score-5.6||MEDIUM
EPSS-0.08% / 24.02%
||
7 Day CHG-0.02%
Published-09 Aug, 2022 | 20:20
Updated-17 Sep, 2024 | 00:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive information.

Action-Not Available
Vendor-Advanced Micro Devices, Inc.
Product-ryzen_9_5900xepyc_7543ryzen_5_3580uepyc_7402ryzen_3_3450uathlon_3150g_firmwareepyc_7f32epyc_7713pepyc_7443epyc_7513ryzen_9_5900x_firmwareryzen_7_4700geryzen_5_2500uryzen_3_3750hryzen_9_5980hxepyc_7453ryzen_3_5300geryzen_3_2300uryzen_5_5600hsryzen_7_5825uryzen_7_5825u_firmwareepyc_7542ryzen_7_4700gryzen_5_3400gepyc_7281_firmwareepyc_7413_firmwareryzen_threadripper_3960x_firmwareryzen_7_5800x3d_firmwareryzen_threadripper_2950xryzen_5_4500u_firmwareryzen_threadripper_pro_3975wxepyc_7002epyc_7643_firmwareepyc_7f52ryzen_threadripper_pro_5945wxepyc_7373x_firmwareryzen_5_2500u_firmwareryzen_3_4300g_firmwareepyc_7f32_firmwareepyc_7001_firmwareepyc_75f3_firmwareryzen_7_3750hepyc_7473x_firmwareryzen_3_2200u_firmwareepyc_7281ryzen_3_2200uryzen_9_4900hsepyc_7551p_firmwareryzen_7_5700gryzen_threadripper_2920xepyc_7601_firmwareryzen_7_5825c_firmwareepyc_7573x_firmwareryzen_5_2600ryzen_7_2700x_firmwareryzen_5_2600hryzen_5_3500uepyc_7401ryzen_3_3750h_firmwareryzen_3_5400uryzen_3_3580uepyc_7713ryzen_5_3550hryzen_5_4500uryzen_threadripper_3990x_firmwareryzen_7_3780u_firmwareryzen_3_3700c_firmwareryzen_3_4300uepyc_7003ryzen_7_4800h_firmwareryzen_3_4300u_firmwareryzen_5_5600x_firmwareryzen_9_5980hs_firmwareryzen_7_3700x_firmwareryzen_7_5800x3dryzen_5_5600ge_firmwareryzen_threadripper_3990xryzen_5_3400g_firmwareryzen_7_2700_firmwareathlon_3150ge_firmwareryzen_5_5600h_firmwareryzen_5_2700xryzen_3_4300geryzen_5_2600_firmwareryzen_7_4700uepyc_7501ryzen_9_5950xryzen_5_3580u_firmwareryzen_5_3600_firmwareryzen_5_4600hryzen_3_3200u_firmwareepyc_7443_firmwareryzen_3_3300x_firmwareepyc_7402pepyc_7343epyc_7252_firmwareepyc_7543_firmwareepyc_7542_firmwareryzen_3_3300uryzen_threadripper_pro_5945wx_firmwareepyc_7313p_firmwareryzen_5_3550h_firmwareepyc_7252ryzen_5_5600uryzen_7_4800hryzen_5_3450gepyc_7502pepyc_7351p_firmwareryzen_9_4900hryzen_5_5600geryzen_7_3700u_firmwareryzen_7_2700u_firmwareepyc_7601ryzen_3_3780u_firmwareryzen_7_3800x_firmwareryzen_7_2800h_firmwareryzen_threadripper_pro_3945wx_firmwareryzen_9_5900hs_firmwareepyc_72f3_firmwareepyc_7662epyc_7642ryzen_threadripper_pro_5975wx_firmwareepyc_7502p_firmwareryzen_5_4600h_firmwareepyc_7413ryzen_7_2700xryzen_3_3500cepyc_7313ryzen_7_5700x_firmwareepyc_7663_firmwareryzen_threadripper_pro_3955wxryzen_3_3200uryzen_9_3900x_firmwareryzen_7_3700uepyc_7251epyc_7351_firmwareepyc_7302pepyc_74f3_firmwareryzen_3_5425uryzen_5_4600gepyc_7763ryzen_threadripper_pro_3955wx_firmwareryzen_9_5980hx_firmwareepyc_7402_firmwareepyc_7713p_firmwareryzen_threadripper_pro_3995wx_firmwareryzen_threadripper_pro_3795wx_firmwareepyc_7f52_firmwareryzen_7_5825cryzen_3_3500c_firmwareryzen_7_5800uryzen_5_5600g_firmwareepyc_7251_firmwareepyc_7401_firmwareepyc_7402p_firmwareryzen_threadripper_2990wxryzen_3_4300ge_firmwareryzen_threadripper_3970xryzen_3_5425c_firmwareepyc_7351ryzen_7_5700xryzen_7_5800hepyc_7543pryzen_threadripper_3970x_firmwareepyc_7453_firmwareryzen_threadripper_pro_3975wx_firmwareryzen_7_4800uryzen_7_5700uryzen_7_5700ge_firmwareathlon_3150geepyc_7502_firmwareryzen_5_2700x_firmwareepyc_7262_firmwareryzen_7_4800u_firmwareepyc_7371_firmwareepyc_7261epyc_7451epyc_7282_firmwareepyc_7551_firmwareepyc_7272_firmwareepyc_7573xryzen_3_3100_firmwareryzen_threadripper_2950x_firmwareryzen_9_3900xepyc_7232p_firmwareepyc_7702ryzen_7_5800hsryzen_threadripper_pro_5955wx_firmwareryzen_5_5600xryzen_threadripper_pro_5995wxryzen_5_4600g_firmwareryzen_5_3600xt_firmwareepyc_7373xepyc_7513_firmwareryzen_3_3550h_firmwareryzen_5_5700geryzen_5_3600x_firmwareryzen_7_3750h_firmwareepyc_7h12_firmwareryzen_threadripper_3960xryzen_3_3700cryzen_5_5560uepyc_75f3epyc_7001ryzen_3_3100epyc_7502epyc_7f72_firmwareepyc_7662_firmwareryzen_7_5700u_firmwareepyc_7343_firmwareryzen_7_3780uepyc_7551ryzen_9_5900hsepyc_7551pepyc_7313pepyc_7002_firmwareryzen_3_3500uryzen_9_5980hsryzen_3_5125c_firmwareryzen_7_3800xt_firmwareryzen_5_5500u_firmwareryzen_7_2700ryzen_7_5800h_firmwareryzen_threadripper_pro_5965wx_firmwareryzen_3_3300xryzen_7_3700xryzen_3_3580u_firmwareryzen_5_5625c_firmwareepyc_7352ryzen_5_5625cepyc_7713_firmwareepyc_7742epyc_7272ryzen_7_2700uryzen_5_3450g_firmwareryzen_9_4900hs_firmwareryzen_9_4900h_firmwareryzen_5_4600geepyc_7003_firmwareepyc_7443p_firmwareryzen_7_2800hryzen_7_5800xathlon_3150gryzen_3_3700uepyc_7773xryzen_5_2600x_firmwareryzen_3_5300gryzen_5_5600hs_firmwareepyc_7261_firmwareryzen_3_3350u_firmwareryzen_threadripper_pro_5955wxryzen_5_5500uryzen_3_5400u_firmwareepyc_7742_firmwareryzen_3_3300u_firmwareryzen_threadripper_pro_3795wxryzen_3_3450u_firmwareryzen_7_3800xepyc_7501_firmwareryzen_5_4600uepyc_7301_firmwareathlon_3050ge_firmwareryzen_threadripper_2990wx_firmwareryzen_5_4600u_firmwareryzen_5_5600hryzen_3_5300u_firmwareepyc_7763_firmwareryzen_3_5300uryzen_3_3550hryzen_3_5425cryzen_5_5600gryzen_3_3300g_firmwareryzen_3_5425u_firmwareryzen_5_3600xtathlon_3050geryzen_threadripper_pro_5975wxepyc_7302p_firmwareryzen_3_2300u_firmwareryzen_9_5900hx_firmwareryzen_9_5950x_firmwareepyc_7642_firmwareryzen_threadripper_2970wxepyc_7452epyc_7h12ryzen_7_5800x_firmwareepyc_7543p_firmwareryzen_5_2600xryzen_5_5625uryzen_3_5300ge_firmwareryzen_threadripper_2920x_firmwareepyc_7401pryzen_7_5700geryzen_3_4300gepyc_7302ryzen_3_5125cepyc_7232pryzen_5_5700gryzen_3_3500u_firmwareryzen_7_4700g_firmwareepyc_7663ryzen_5_5600u_firmwareepyc_7552_firmwareepyc_7773x_firmwareryzen_5_3600xepyc_7371epyc_7f72ryzen_7_3800xtryzen_7_5700g_firmwareryzen_threadripper_2970wx_firmwareepyc_7473xepyc_7451_firmwareryzen_9_3950x_firmwareepyc_7532_firmwareryzen_threadripper_pro_3995wxepyc_7301epyc_7401p_firmwareryzen_5_5700g_firmwareepyc_7351pryzen_3_5300g_firmwareryzen_7_4700ge_firmwareryzen_7_5800u_firmwareryzen_7_4700u_firmwareepyc_7532epyc_7552epyc_7702p_firmwareryzen_3_3700u_firmwareryzen_5_5700ge_firmwareepyc_7302_firmwareryzen_5_5560u_firmwareepyc_73f3_firmwareepyc_7702pepyc_7262ryzen_5_2600h_firmwareryzen_threadripper_pro_5965wxryzen_9_5900hxryzen_3_3250uepyc_72f3epyc_7643epyc_7452_firmwareryzen_9_3950xryzen_3_3300gepyc_7313_firmwareepyc_7443pryzen_3_3780uryzen_3_3250u_firmwareryzen_5_3600ryzen_threadripper_pro_3945wxryzen_5_3500u_firmwareryzen_5_4600ge_firmwareryzen_7_5800hs_firmwareepyc_7282ryzen_threadripper_pro_5995wx_firmwareepyc_7702_firmwareepyc_7352_firmwareepyc_74f3ryzen_5_5625u_firmwareryzen_3_3350uepyc_73f3AMD Processors
CWE ID-CWE-203
Observable Discrepancy
  • Previous
  • 1
  • 2
  • Next
Details not found