Vulnerabilities
Vulnerable Software
Amd:  >> Epyc 7713 Firmware  Security Vulnerabilities
A TOCTOU (Time-Of-Check-Time-Of-Use) in SMM may allow an attacker with ring0 privileges and access to the BIOS menu or UEFI shell to modify the communications buffer potentially resulting in arbitrary code execution.
CVSS Score
7.5
EPSS Score
0.0
Published
2024-08-13
IOMMU improperly handles certain special address ranges with invalid device table entries (DTEs), which may allow an attacker with privileges and a compromised Hypervisor to induce DTE faults to bypass RMP checks in SEV-SNP, potentially leading to a loss of guest integrity.
CVSS Score
5.3
EPSS Score
0.0
Published
2024-08-13
Improper re-initialization of IOMMU during the DRTM event may permit an untrusted platform configuration to persist, allowing an attacker to read or modify hypervisor memory, potentially resulting in loss of confidentiality, integrity, and availability.
CVSS Score
6.5
EPSS Score
0.001
Published
2024-08-13
An out of bounds memory write when processing the AMD PSP1 Configuration Block (APCB) could allow an attacker with access the ability to modify the BIOS image, and the ability to sign the resulting image, to potentially modify the APCB block resulting in arbitrary code execution.
CVSS Score
7.2
EPSS Score
0.0
Published
2024-08-13
Improper input validation in SEV-SNP could allow a malicious hypervisor to read or overwrite guest memory potentially leading to data leakage or data corruption.
CVSS Score
6.0
EPSS Score
0.015
Published
2024-08-05
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to potentially overwrite a guest's memory or UMC seed resulting in loss of confidentiality and integrity.
CVSS Score
7.9
EPSS Score
0.009
Published
2024-08-05
Improper restriction of write operations in SNP firmware could allow a malicious hypervisor to overwrite a guest's UMC seed potentially allowing reading of memory from a decommissioned guest.
CVSS Score
6.0
EPSS Score
0.009
Published
2024-08-05
Failure to initialize memory in SEV Firmware may allow a privileged attacker to access stale data from other guests.
CVSS Score
6.0
EPSS Score
0.0
Published
2024-02-13
Due to a code bug in Secure_TSC, SEV firmware may allow an attacker with high privileges to cause a guest to observe an incorrect TSC when Secure TSC is enabled potentially resulting in a loss of guest integrity.  
CVSS Score
4.9
EPSS Score
0.0
Published
2024-02-13
A privileged attacker can prevent delivery of debug exceptions to SEV-SNP guests potentially resulting in guests not receiving expected debug information.
CVSS Score
3.2
EPSS Score
0.001
Published
2024-01-11


Contact Us

Shodan ® - All rights reserved