CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS
Percentile
12.6%
Improper validation of destination address in SVC_LOAD_FW_IMAGE_BY_INSTANCE and SVC_LOAD_BINARY_BY_ATTRIB in a malicious UApp or ABL may allow an attacker to overwrite arbitrary bootloader memory with SPI ROM contents resulting in a loss of integrity and availability.
Vendor | Product | Version | CPE |
---|---|---|---|
amd | epyc_7763 | - | cpe:2.3:h:amd:epyc_7763:-:*:*:*:*:*:*:* |
amd | epyc_7763_firmware | * | cpe:2.3:o:amd:epyc_7763_firmware:*:*:*:*:*:*:*:* |
amd | epyc_7713p_firmware | * | cpe:2.3:o:amd:epyc_7713p_firmware:*:*:*:*:*:*:*:* |
amd | epyc_7713p | - | cpe:2.3:h:amd:epyc_7713p:-:*:*:*:*:*:*:* |
amd | epyc_7713_firmware | * | cpe:2.3:o:amd:epyc_7713_firmware:*:*:*:*:*:*:*:* |
amd | epyc_7713 | - | cpe:2.3:h:amd:epyc_7713:-:*:*:*:*:*:*:* |
amd | epyc_7663_firmware | * | cpe:2.3:o:amd:epyc_7663_firmware:*:*:*:*:*:*:*:* |
amd | epyc_7663 | - | cpe:2.3:h:amd:epyc_7663:-:*:*:*:*:*:*:* |
amd | epyc_7643_firmware | * | cpe:2.3:o:amd:epyc_7643_firmware:*:*:*:*:*:*:*:* |
amd | epyc_7643 | - | cpe:2.3:h:amd:epyc_7643:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:N/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
EPSS
Percentile
12.6%