Lucene search

K

CVE-2020-12954

🗓️ 16 Nov 2021 19:07:15Reported by [email protected]Type 
nvd
 nvd
🔗 web.nvd.nist.gov👁 8 Views

Integrated chipset allows unauthorized SPI ROM modificatio

Show more
Related
Detection
Refs
ReporterTitlePublishedViews
Family
CVE
CVE-2020-12954
16 Nov 202119:15
cve
Cvelist
CVE-2020-12954
16 Nov 202118:11
cvelist
Prion
Design/Logic Flaw
16 Nov 202119:15
prion
Amd
AMD Server Vulnerabilities – November 2021
8 Nov 202100:00
amd
Nvd
Node
amdepyc_7003_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7002_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7001_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_72f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7313p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7343_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_73f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7413_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7443p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7453_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_74f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7513_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7543p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_75f3_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7643_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7663_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7713p_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7763_firmwareRange<milanpi-sp3_1.0.0.4
AND
Node
amdepyc_7232p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7252_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7262_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7272_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7282_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7302p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7352_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7402p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7452_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7502p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7532_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7542_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7552_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7642_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7662_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7702p_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7742_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f32_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f52_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7f72_firmwareRange<romepi-sp3_1.0.0.c
AND
Node
amdepyc_7251_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7281_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7301_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7351p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7401_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7401p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7451_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7501_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7551p_firmwareRange<naplespi-sp3_1.0.0.g
AND
Node
amdepyc_7601_firmwareRange<naplespi-sp3_1.0.0.g
AND

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
16 Nov 2021 19:15Current
CVSS22.1
CVSS35.5
EPSS0.000
8
.json
Report