A side effect of an integrated chipset option may be able to be used by an attacker to bypass SPI ROM protections, allowing unauthorized SPI ROM modification.
5.5CVSS
5.9AI Score
0.0004EPSS
AMD EPYC™ Processors contain an information disclosure vulnerability in the Secure Encrypted Virtualization with Encrypted State (SEV-ES) and Secure Encrypted Virtualization with Secure Nested Paging (SEV-SNP). A local authenticated attacker could potentially exploit this vulnerability leading to l...
5.5CVSS
5AI Score
0.0004EPSS
Insufficient validation of guest context in the SNP Firmware could lead to a potential loss of guest confidentiality.
5.5CVSS
5.9AI Score
0.0004EPSS
AMD System Management Unit (SMU) may experience a heap-based overflow which may result in a loss of resources.
5.5CVSS
6.1AI Score
0.0004EPSS
Insufficient bounds checking in System Management Unit (SMU) may cause invalid memory accesses/updates that could result in SMU hang and subsequent failure to service any further requests from other components.
5.5CVSS
6.3AI Score
0.0004EPSS
Insufficient DRAM address validation in System Management Unit (SMU) may result in a DMA read from invalid DRAM address to SRAM resulting in SMU not servicing further requests.
5.5CVSS
6.2AI Score
0.0004EPSS
Insufficient validation in ASP BIOS and DRTM commands may allow malicious supervisor x86 software to disclose the contents of sensitive memory which may result in information disclosure.
5.5CVSS
6AI Score
0.0004EPSS
Insufficient bounds checking in ASP may allow anattacker to issue a system call from a compromised ABL which may causearbitrary memory values to be initialized to zero, potentially leading to aloss of integrity.
5.5CVSS
7.2AI Score
0.0004EPSS
Insufficient fencing and checks in System Management Unit (SMU) may result in access to invalid message port registers that could result in a potential denial-of-service.
5.5CVSS
6.1AI Score
0.0004EPSS
A compromised or malicious ABL or UApp couldsend a SHA256 system call to the bootloader, which may result in exposure ofASP memory to userspace, potentially leading to information disclosure.
5.5CVSS
7.1AI Score
0.0004EPSS
Improper input validation and bounds checking in SEV firmware may leak scratch buffer bytes leading to potential information disclosure.
5.5CVSS
6.2AI Score
0.0004EPSS
Execution unit scheduler contention may lead to a side channel vulnerability found on AMD CPU microarchitectures codenamed “Zen 1”, “Zen 2” and “Zen 3” that use simultaneous multithreading (SMT). By measuring the contention level on scheduler queues an attacker may potentially leak sensitive inform...
5.6CVSS
5.7AI Score
0.0004EPSS
IBPB may not prevent return branch predictions from being specified by pre-IBPB branch targets leading to a potential information disclosure.
5.5CVSS
5.6AI Score
0.001EPSS
TOCTOU in the ASP may allow a physical attacker to write beyond the buffer bounds, potentially leading to a loss of integrity or denial of service.
5.7CVSS
6.1AI Score
0.001EPSS
Insufficient input validation in the SMU may allow an attacker to improperly lock resources, potentially resulting in a denial of service.
5.3CVSS
5.9AI Score
0.001EPSS