Vulnerabilities
Vulnerable Software
Amd:  >> Ryzen  Security Vulnerabilities
A potential power side-channel vulnerability in AMD processors may allow an authenticated attacker to monitor the CPU power consumption as the data in a cache line changes over time potentially resulting in a leak of sensitive information.
CVSS Score
4.7
EPSS Score
0.001
Published
2023-08-01
A timing and power-based side channel attack leveraging the x86 PREFETCH instructions on some AMD CPUs could potentially result in leaked kernel address space information.
CVSS Score
4.7
EPSS Score
0.001
Published
2021-10-13
The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips allow Platform Security Processor (PSP) privilege escalation.
CVSS Score
9.0
EPSS Score
0.006
Published
2018-03-22
The AMD EPYC Server, Ryzen, Ryzen Pro, and Ryzen Mobile processor chips have insufficient enforcement of Hardware Validated Boot, aka MASTERKEY-1, MASTERKEY-2, and MASTERKEY-3.
CVSS Score
9.0
EPSS Score
0.006
Published
2018-03-22
The AMD Ryzen, Ryzen Pro, and Ryzen Mobile processor chips have insufficient access control for the Secure Processor, aka RYZENFALL-1.
CVSS Score
9.0
EPSS Score
0.005
Published
2018-03-22
The AMD Ryzen and Ryzen Pro processor chips have insufficient access control for the Secure Processor, aka RYZENFALL-2, RYZENFALL-3, and RYZENFALL-4.
CVSS Score
9.0
EPSS Score
0.005
Published
2018-03-22
The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in firmware, aka CHIMERA-FW.
CVSS Score
9.0
EPSS Score
0.006
Published
2018-03-22
The Promontory chipset, as used in AMD Ryzen and Ryzen Pro platforms, has a backdoor in the ASIC, aka CHIMERA-HW.
CVSS Score
9.0
EPSS Score
0.006
Published
2018-03-22
The AMD Ryzen processor with AGESA microcode through 2017-01-27 allows local users to cause a denial of service (system hang) via an application that makes a long series of FMA3 instructions, as demonstrated by the Flops test suite.
CVSS Score
5.5
EPSS Score
0.001
Published
2017-03-25


Contact Us

Shodan ® - All rights reserved