Lucene search

K

CVE-2023-20528

🗓️ 11 Jan 2023 08:13:15Reported by AMDType 
cve
 cve
🔗 web.nvd.nist.gov👁 36 Views

Insufficient input validation in SMU, potential memory exfiltratio

Show more
Related
Detection
Affected
Refs
ReporterTitlePublishedViews
Family
NVD
CVE-2023-20528
11 Jan 202308:15
nvd
Cvelist
CVE-2023-20528
10 Jan 202320:57
cvelist
Prion
Input validation
11 Jan 202308:15
prion
Amd
AMD Server Vulnerabilities – January 2023
10 Jan 202300:00
amd
Nvd
Node
amdepyc_7h12_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7f72_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7f52_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7f32_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7742_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7702p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7702_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7662_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7642_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7552_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7542_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7532_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7502p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7502_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7452_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7402_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7402p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7352_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7302p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7302_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7282_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7272_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7262_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7252_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7232p_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7002_firmwareRange<romepi_1.0.0.c
AND
Node
amdepyc_7003_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_72f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7313_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7313p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7343_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7373x_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_73f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7413_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7443_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7443p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7453_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_74f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7513_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7543_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7543p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7573x_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_75f3_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7643_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7663_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7713_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7713p_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7743_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7763_firmwareRange<milanpi_1.0.0.5
AND
Node
amdepyc_7773x_firmwareRange<milanpi_1.0.0.5
AND
[
  {
    "defaultStatus": "unaffected",
    "packageName": "AGESA",
    "platforms": [
      "x86"
    ],
    "product": "2nd Gen EPYC",
    "vendor": " AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various "
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "packageName": "AGESA",
    "platforms": [
      "x86"
    ],
    "product": "3rd Gen EPYC",
    "vendor": "AMD",
    "versions": [
      {
        "status": "affected",
        "version": "various "
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
11 Jan 2023 08:15Current
4.6Medium risk
Vulners AI Score4.6
CVSS32.4
EPSS0.0005
36
.json
Report