Lucene search

K
freebsdFreeBSD7D631146-5769-11EF-B618-1C697A616631
HistoryAug 09, 2024 - 12:00 a.m.

AMD CPUs -- Guest Memory Vulnerabilities

2024-08-0900:00:00
vuxml.freebsd.org
7
amd
cpus
smm
vulnerabilities
memory
configuration
ring 0
access
msr
validation
arbitrary code execution
smi lock
improper validation
ioactive
unix

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

9.5%

AMD reports:

   Researchers from IOActive have reported that it may be possible for
   an attacker with ring 0 access to modify the configuration of System
   Management Mode (SMM) even when SMM Lock is enabled.  Improper
   validation in a model specific register (MSR) could allow a malicious
   program with ring0 access to modify SMM configuration while SMI lock
   is enabled, potentially leading to arbitrary code execution.
OSVersionArchitecturePackageVersionFilename
FreeBSDanynoarchcpu-microcode-amd< 20240810UNKNOWN

CVSS3

7.5

Attack Vector

LOCAL

Attack Complexity

HIGH

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H

AI Score

7.2

Confidence

Low

EPSS

0

Percentile

9.5%