Lucene search

K

CVE-2020-12954

🗓️ 16 Nov 2021 19:07:15Reported by AMDType 
cve
 cve
🔗 web.nvd.nist.gov👁 40 Views🌐 2 Media mentions

A side effect of integrated chipset option allowing unauthorized SPI ROM modificatio

Show more
Related
Detection
Affected
Refs
Social
ReporterTitlePublishedViews
Family
NVD
CVE-2020-12954
16 Nov 202119:15
nvd
Prion
Design/Logic Flaw
16 Nov 202119:15
prion
Cvelist
CVE-2020-12954
16 Nov 202118:11
cvelist
Redos
ROS-20241209-01
9 Dec 202400:00
redos
Amd
AMD Server Vulnerabilities – November 2021
8 Nov 202100:00
amd
Nvd
Node
amdepyc_7003_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7002_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7001_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_72f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7343_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_73f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7413_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7453_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_74f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7513_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_75f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7643_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7663_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7763_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7232p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7252_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7262_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7272_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7282_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7352_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7452_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7532_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7542_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7552_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7642_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7662_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7742_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f32_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f52_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f72_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7251_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7281_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7301_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7401_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7401p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7451_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7501_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7601_firmwareRange<naplespi-sp3_1.0.0.g
AND
[
  {
    "product": "1st Gen AMD EPYC™",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "NaplesPI-SP3_1.0.0.G",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "2nd Gen AMD EPYC™",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "RomePI-SP3_1.0.0.C",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  },
  {
    "product": "3rd Gen AMD EPYC™",
    "vendor": "AMD",
    "versions": [
      {
        "lessThan": "MilanPI-SP3_1.0.0.4",
        "status": "affected",
        "version": "unspecified",
        "versionType": "custom"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Nov 2021 19:15Current
5.9Medium risk
Vulners AI Score5.9
CVSS22.1
CVSS35.5
EPSS0.0004
40
.json
Report