Vulnerabilities
Vulnerable Software
Amd:  Security Vulnerabilities
Failure to verify SEV-ES TMR is not in MMIO space, SEV-ES FW could result in a potential loss of integrity or availability.
CVSS Score
7.1
EPSS Score
0.0
Published
2022-05-10
Insufficient bound checks in System Management Unit (SMU) PCIe Hot Plug table may result in access/updates from/to invalid address space that could result in denial of service.
CVSS Score
5.5
EPSS Score
0.001
Published
2022-05-10
Failure to validate inputs in SMM may allow an attacker to create a mishandled error leaving the DRTM UApp in a partially initialized state potentially resulting in loss of memory integrity.
CVSS Score
7.8
EPSS Score
0.001
Published
2022-05-10
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
CVSS Score
7.1
EPSS Score
0.001
Published
2022-05-10
A malicious or compromised UApp or ABL may coerce the bootloader into corrupting arbitrary memory potentially leading to loss of integrity of data.
CVSS Score
6.2
EPSS Score
0.001
Published
2022-05-10
Insufficient validation of elliptic curve points in SEV-legacy firmware may compromise SEV-legacy guest migration potentially resulting in loss of guest's integrity or confidentiality.
CVSS Score
7.1
EPSS Score
0.001
Published
2022-05-10
A bug with the SEV-ES TMR may lead to a potential loss of memory integrity for SNP-active VMs.
CVSS Score
7.8
EPSS Score
0.0
Published
2022-05-10
LFENCE/JMP (mitigation V2-2) may not sufficiently mitigate CVE-2017-5715 on some AMD CPUs.
CVSS Score
5.6
EPSS Score
0.001
Published
2022-03-11
Some AMD CPUs may transiently execute beyond unconditional direct branches, which may potentially result in data leakage.
CVSS Score
6.5
EPSS Score
0.001
Published
2022-03-11
On Xilinx Zynq-7000 SoC devices, physical modification of an SD boot image allows for a buffer overflow attack in the ROM. Because the Zynq-7000's boot image header is unencrypted and unauthenticated before use, an attacker can modify the boot header stored on an SD card so that a secure image appears to be unencrypted, and they will be able to modify the full range of register initialization values. Normally, these registers will be restricted when booting securely. Of importance to this attack are two registers that control the SD card's transfer type and transfer size. These registers could be modified a way that causes a buffer overflow in the ROM.
CVSS Score
6.8
EPSS Score
0.001
Published
2022-02-10


Contact Us

Shodan ® - All rights reserved