CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
AI Score
Confidence
High
EPSS
Percentile
29.2%
A potential power side-channel vulnerability in some AMD processors may allow an authenticated attacker to use the power reporting functionality to monitor a program’s execution inside an AMD SEV VM potentially resulting in a leak of sensitive information.
Vendor | Product | Version | CPE |
---|---|---|---|
amd | epyc_7251_firmware | - | cpe:2.3:o:amd:epyc_7251_firmware:-:*:*:*:*:*:*:* |
amd | epyc_7251 | - | cpe:2.3:h:amd:epyc_7251:-:*:*:*:*:*:*:* |
amd | epyc_7281_firmware | - | cpe:2.3:o:amd:epyc_7281_firmware:-:*:*:*:*:*:*:* |
amd | epyc_7281 | - | cpe:2.3:h:amd:epyc_7281:-:*:*:*:*:*:*:* |
amd | epyc_7301_firmware | - | cpe:2.3:o:amd:epyc_7301_firmware:-:*:*:*:*:*:*:* |
amd | epyc_7301 | - | cpe:2.3:h:amd:epyc_7301:-:*:*:*:*:*:*:* |
amd | epyc_7351_firmware | - | cpe:2.3:o:amd:epyc_7351_firmware:-:*:*:*:*:*:*:* |
amd | epyc_7351 | - | cpe:2.3:h:amd:epyc_7351:-:*:*:*:*:*:*:* |
amd | epyc_7351p_firmware | - | cpe:2.3:o:amd:epyc_7351p_firmware:-:*:*:*:*:*:*:* |
amd | epyc_7351p | - | cpe:2.3:h:amd:epyc_7351p:-:*:*:*:*:*:*:* |
[
{
"defaultStatus": "affected",
"packageName": " ",
"platforms": [
"x86"
],
"product": "1st Gen AMD EPYC™ Processors",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"packageName": " ",
"platforms": [
"x86"
],
"product": "2nd Gen AMD EPYC™ Processors",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "affected",
"packageName": " ",
"platforms": [
"x86"
],
"product": "3rd Gen AMD EPYC™ Processors",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "various "
}
]
},
{
"defaultStatus": "unaffected",
"platforms": [
"x86"
],
"product": "4th Gen AMD EPYC™ Processors",
"vendor": "AMD",
"versions": [
{
"status": "affected",
"version": "Various "
}
]
}
]